Movatterモバイル変換


[0]ホーム

URL:


US10776464B2 - System and method for adaptive application of authentication policies - Google Patents

System and method for adaptive application of authentication policies
Download PDF

Info

Publication number
US10776464B2
US10776464B2US14/218,646US201414218646AUS10776464B2US 10776464 B2US10776464 B2US 10776464B2US 201414218646 AUS201414218646 AUS 201414218646AUS 10776464 B2US10776464 B2US 10776464B2
Authority
US
United States
Prior art keywords
authentication
client
interaction
location
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US14/218,646
Other versions
US20140289790A1 (en
Inventor
Brendon Wilson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nok Nok Labs Inc
Original Assignee
Nok Nok Labs Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nok Nok Labs IncfiledCriticalNok Nok Labs Inc
Priority to US14/218,646priorityCriticalpatent/US10776464B2/en
Publication of US20140289790A1publicationCriticalpatent/US20140289790A1/en
Assigned to NOK NOK LABS, INC.reassignmentNOK NOK LABS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: WILSON, BRENDON
Assigned to VENTURE LENDING & LEASING VII, INC., VENTURE LENDING & LEASING VIII, INC.reassignmentVENTURE LENDING & LEASING VII, INC.SECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: NOK NOK LABS, INC.
Assigned to VENTURE LENDING & LEASING IX, INC., VENTURE LENDING & LEASING VIII, INC.reassignmentVENTURE LENDING & LEASING IX, INC.SECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: NOK NOK LABS, INC.
Publication of US10776464B2publicationCriticalpatent/US10776464B2/en
Application grantedgrantedCritical
Assigned to NOK NOK LABS, INC.reassignmentNOK NOK LABS, INC.RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: VENTURE LENDING & LEASING VII, INC., VENTURE LENDING & LEASING VIII, INC.
Assigned to NOK NOK LABS, INC.reassignmentNOK NOK LABS, INC.RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: VENTURE LENDING & LEASING IX, INC., VENTURE LENDING & LEASING VIII, INC.
Assigned to NOK NOK LABS, INC.reassignmentNOK NOK LABS, INC.CORRECTIVE ASSIGNMENT TO CORRECT THE ERRONEOUSLY RECORDED PATENT APPLICATION NUMBER 14488747 PREVIOUSLY RECORDED ON REEL 71273 FRAME 25. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST.Assignors: VENTURE LENDING & LEASING IX, INC., VENTURE LENDING & LEASING VIII, INC.
Assigned to MUFG Bank, Ltd.reassignmentMUFG Bank, Ltd.SECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: NOK NOK LABS, INC.
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

A system, apparatus, method, and machine readable medium are described for adaptively implementing an authentication policy. For example, one embodiment of a method comprises: detecting a user of a client attempting to perform a current interaction with a relying party; and responsively identifying a first interaction class for the current interaction based on variables associated with the current interaction and implementing a set of one or more authentication rules associated with the first interaction class.

Description

CROSS REFERENCE TO RELATED APPLICATIONS
This application claims the benefit of and priority to U.S. Provisional Patent Application No. 61/804,568, filed, Mar. 22, 2013, entitled, “Advanced Methods of Authentication And Its Applications”.
BACKGROUND
Field of the Invention
This invention relates generally to the field of data processing systems. More particularly, the invention relates to a system and method for adaptive application of authentication policies.
Description of Related Art
FIG. 1 illustrates anexemplary client120 with abiometric device100. When operated normally, abiometric sensor102 reads raw biometric data from the user (e.g., capture the user's fingerprint, record the user's voice, snap a photo of the user, etc) and afeature extraction module103 extracts specified characteristics of the raw biometric data (e.g., focusing on certain regions of the fingerprint, certain facial features, etc). Amatcher module104 compares the extracted features133 withbiometric reference data110 stored in a secure storage on theclient120 and generates a score based on the similarity between the extracted features and thebiometric reference data110. Thebiometric reference data110 is typically the result of an enrollment process in which the user enrolls a fingerprint, voice sample, image or other biometric data with thedevice100. Anapplication105 may then use the score to determine whether the authentication was successful (e.g., if the score is above a certain specified threshold).
Systems have been designed for providing secure user authentication over a network using biometric sensors. In such systems, the score generated by the application, and/or other authentication data, may be sent over a network to authenticate the user with a remote server. For example, Patent Application No. 2011/0082801 (“'801 application”) describes a framework for user registration and authentication on a network which provides strong authentication (e.g., protection against identity theft and phishing), secure transactions (e.g., protection against “malware in the browser” and “man in the middle” attacks for transactions), and enrollment/management of client authentication tokens (e.g., fingerprint readers, facial recognition devices, smartcards, trusted platform modules, etc).
The assignee of the present application has developed a variety of improvements to the authentication framework described in the '801 application. Some of these improvements are described in the following set of U.S. Patent Applications (“Co-pending Applications”), all filed Dec. 29, 1012, which are assigned to the present assignee and incorporated herein by reference: Ser. No. 13/730,761, Query System and Method to Determine Authentication Capabilities; Ser. No. 13/730,776, System and Method for Efficiently Enrolling, Registering, and Authenticating With Multiple Authentication Devices; Ser. No. 13/730,780, System and Method for Processing Random Challenges Within an Authentication Framework; Ser. No. 13/730,791, System and Method for Implementing Privacy Classes Within an Authentication Framework; Ser. No. 13/730,795, System and Method for Implementing Transaction Signaling Within an Authentication Framework.
Briefly, the Co-Pending applications describe authentication techniques in which a user enrolls with biometric devices of a client to generate biometric template data (e.g., by swiping a finger, snapping a picture, recording a voice, etc); registers the biometric devices with one or more servers over a network (e.g., Websites or other relying parties equipped with secure transaction services as described in the Co-Pending applications); and subsequently authenticates with those servers using data exchanged during the registration process (e.g., encryption keys provisioned into the biometric devices). Once authenticated, the user is permitted to perform one or more online transactions with a Website or other relying party. In the framework described in the Co-Pending applications, sensitive information such as fingerprint data and other data which can be used to uniquely identify the user, may be retained locally on the user's client device (e.g., smartphone, notebook computer, etc) to protect a user's privacy.
For certain classes of transactions, the riskiness associated with the transaction may be inextricably tied to the location where the transaction is being performed. For example, it may be inadvisable to allow a transaction that appears to originate in a restricted country, such as those listed on the US Office of Foreign Asset Control List (e.g., Cuba, Libya, North Korea, etc). In other cases, it may only be desirable to allow a transaction to proceed if a stronger authentication mechanism is used; for example, a transaction undertaken from within the corporation's physical premises may require less authentication than one conducted from a Starbucks located in a remote location where the company does not have operations.
However, reliable location data may not be readily available for a variety of reasons. For example, the end user's device may not have GPS capabilities; the user may be in a location where Wifi triangulation data is unavailable or unreliable; the network provider may not support provide cell tower triangulation capabilities to augment GPS, or Wifi triangulation capabilities. Other approaches to divine the device's location may not have a sufficient level of assurance to meet the organization's needs; for example, reverse IP lookups to determine a geographic location may be insufficiently granular, or may be masked by proxies designed to mask the true network origin of the user's device.
In these cases, an organization seeking to evaluate the riskiness of a transaction may require additional data to provide them with additional assurance that an individual is located in a specific geographic area to drive authentication decisions.
Another challenge for organizations deploying authentication is to match the “strength” of the authentication mechanism to the inherent risks presented by a particular user's environment (location, device, software, operating system), the request being made by the user or device (a request for access to restricted information, or to undertake a particular operation), and the governance policies of the organization.
To date, organizations have had to rely on a fairly static response to the authentication needs of its users: the organization evaluates the risks a user will face during operations they normally perform and the requirements of any applicable regulatory mandate, and then deploys an authentication solution to defend against that risk and achieve compliance. This usually requires the organization to deploy multiple authentication solutions to address the multitude and variety of risks that their different users may face, which can be especially costly and cumbersome to manage.
The techniques described in the Co-pending applications provide an abstraction that allows the organization to identify existing capabilities on the user's device that can be used for authentication. This abstraction shields an organization from the need to deploy a variety of different authentication solutions. However, the organization still needs a way to invoke the “correct” authentication mechanism when necessary. Existing implementations provide no capabilities for the organization to describe what authentication mechanism is appropriate under which circumstances. As a result, an organization would likely need to codify their authentication policy in code, making the solution brittle and necessitating code changes in the future to enable use of new authentication devices/tokens.
BRIEF DESCRIPTION OF THE DRAWINGS
A better understanding of the present invention can be obtained from the following detailed description in conjunction with the following drawings, in which:
FIG. 1 illustrates an exemplary client equipped with a biometric device;
FIG. 2 illustrates one embodiment of a system for performing location-aware application of authentication policy;
FIG. 3 illustrates an exemplary set of authentication policy rules;
FIG. 4 illustrates a method in accordance with one embodiment of the invention;
FIG. 5 illustrates one embodiment of the invention in which location is determined or confirmed by proximity of other peer or network devices;
FIG. 6 illustrates one embodiment of a system for authentication which uses environmental sensors;
FIG. 7 illustrates one embodiment of a method for authentication which uses environmental sensors;
FIG. 8 illustrates one embodiment of a system for adaptively applying an authentication policy;
FIG. 9 illustrates one embodiment of a method for adaptively applying an authentication policy; and
FIGS. 10A-B illustrate exemplary system architectures on which the embodiments of the invention may be implemented.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
Described below are embodiments of an apparatus, method, and machine-readable medium for implementing a location-aware authentication policy. Throughout the description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without some of these specific details. In other instances, well-known structures and devices are not shown or are shown in a block diagram form to avoid obscuring the underlying principles of the present invention.
The embodiments of the invention discussed below involve client devices with authentication capabilities such as biometric devices or PIN entry. These devices are sometimes referred to herein as “tokens,” “authentication devices,” or “authenticators.” Various different biometric devices may be used including, but not limited to, fingerprint sensors, voice recognition hardware/software (e.g., a microphone and associated software for recognizing a user's voice), facial recognition hardware/software (e.g., a camera and associated software for recognizing a user's face), and optical recognition capabilities (e.g., an optical scanner and associated software for scanning the retina of a user). The authentication capabilities may also include non-biometric devices such as trusted platform modules (TPMs) smartcards, Trusted Execution Environments (TEEs), and Secure Elements (SEs)
As mentioned above, in a mobile biometric implementation, the biometric device may be remote from the relying party. As used herein, the “relying party” is the entity which utilizes the authentication techniques described herein to authenticate the end user. For example, the relying party may be an online financial service, online retail service (e.g., Amazon®), cloud service, or other type of network service with which the user is attempting to complete a transaction (e.g., transferring funds, making a purchase, accessing data, etc). In addition, as used herein, the term “remote” means that the biometric sensor is not part of the security boundary of the computer it is communicatively coupled to (e.g., it is not embedded into the same physical enclosure as the relying party computer). By way of example, the biometric device may be coupled to the relying party via a network (e.g., the Internet, a wireless network link, etc) or via a peripheral input such as a USB port. Under these conditions, there may be no way for the relying party to know if the device is one which is authorized by the relying party (e.g., one which provides an acceptable level of authentication and integrity protection) and/or whether a hacker has compromised the biometric device. Confidence in the biometric device depends on the particular implementation of the device.
Location-Aware Authentication Techniques
One embodiment of the invention implements an authentication policy that allows authentication mechanisms to be selected based on the physical location of the client device being used for authentication. For example, the client and/or server may make a determination of the physical location of the client device, and feed that location to a policy engine that evaluates an ordered set of policy rules. In one embodiment, these rules specify classes of locations and the authentication mechanism or mechanisms that must be applied if the client location matches the location definition in the rule.
As illustrated inFIG. 2, one embodiment of the invention includes aclient device200 with anauthentication policy engine210 for implementing the location-aware authentication policies described herein. In particular, this embodiment includes a locationclass determination module240 for using the current location of theclient device200, provided by location sensors241 (e.g., a GPS device), to identify a current location “class.” As discussed in detail below, different location “classes” may be defined comprising known geographical points and/or regions. Location class data may be continuously updated and stored in a persistent location data storage device245 (e.g., a flash storage or other persistent storage device). The locationclass determination module240 may then compare the current location provided by the sensor(s)241 against the defined “classes” to determine a current location class for theclient device200.
In one embodiment, the relyingparty250 specifies the authentication policy to be implemented by theauthentication policy engine210 for each transaction (as indicated by the dotted line from the relying party to the authentication policy engine). Thus, the authentication policy may be uniquely tailored to the authentication requirements of each relying party. In addition, the level of authentication required may be determined based on the current transaction (as defined by the authentication policy). For example, a transaction which requires a transfer of a significant amount of money may require a relatively high authentication assurance threshold, whereas non-monetary transaction may require a relatively lower authentication assurance threshold. Thus, the location-aware authentication techniques described herein may be sufficient for certain transactions but may be combined with more rigorous authentication techniques for other transactions.
In one embodiment, the locationclass determination module240 provides the determined class to anauthentication policy module211 which implements a set of rules to identify theauthentication techniques212 to be used for the determined class. By way of example, and not limitation,FIG. 3 illustrates an exemplary set of rules 1-5 specifying one or more authentication techniques 1-5 which may be used for each defined location class 1-5. Although illustrated as a table data structure inFIG. 3, the underlying principles of the invention are not limited to any particular type of data structure for implementing the rule set.
Once theauthentication policy engine210 selects a set ofauthentication techniques212, theauthentication policy engine210 may implement the techniques using one or more explicit user authentication devices220-221 and/or non-intrusive authentication techniques242-243 to authenticate the user with a relyingparty250. By way of example, and not limitation, the explicit user authentication220-221 may include requiring the user to enter a secret code such as a PIN, fingerprint authentication, voice or facial recognition, and retinal scanning, to name a few.
The non-intrusive authentication techniques242-243 may includeuser behavior sensors242 which collect data related to user behavior for authenticating the user. For example, the biometric gait of the user may be measured using an accelerometer or other type ofsensor242 in combination with software and/or hardware designed to generate a gait “fingerprint” of the user's normal walking pattern. As discussed below,other sensors243 may be used to collect data used for authentication. For example, network data may be collected identifying network/computing devices within the local proximity of the client device200 (e.g., known peer computers, access points, cell towers, etc).
In one embodiment,secure storage225 is a secure storage device used to store authentication keys associated with each of the authentication devices220-221. As discussed below, the authentication keys may be used to establish secure communication channels with the relyingparty250 via asecure communication module213.
Various different “classes” of locations may be defined consistent with the underlying principles of the invention. By way of example, and not limitation, the following classes of locations may be defined:
Class 1: The client is within a given radius of a specified location. In this class, the associated authentication policy is applied if the current client location is within an area bounded by a circle of a given radius, centered at a specified latitude and longitude.
Class 2: The client is within a specified boundary region. In this class, the associated authentication policy is applied if the client is located within an area bounded by a polygon defined by an ordered set of latitude and longitude pairs (e.g., a closed polygon).
Class 3: The client is outside a specified boundary. In this class, the associated authentication policy is applied if the client is located outside an area bounded by a polygon defined by an ordered set of latitude and longitude pairs (e.g., a closed polygon).
In one embodiment, additional classes are defined using Boolean combinations of the classes and policy rules defined above. For example, the Boolean operations AND, OR, NOT, and the nesting of Boolean operations allow the expression of complex conditions. Such policies could be used, for example, to implement a policy that applies when the client is located in one of a variety of facilities owned by a company.
Various different mechanisms may be used to determine the current physical location of the client (represented generally inFIG. 2 as location sensors241), including, but not limited to the following:
GPS: Embedded GPS sensors can directly provide details on the location of the client. New emerging standards seek to add authentication of the location provided as a capability that address this shortcoming in current GPS solutions.
Geo-IP Lookup: Reverse lookups of the client's IP address can be used to determine a coarse approximation of the client's location. However, the trustworthiness of the location obtained through this method requires the IP address to be cross-checked against blacklists of known compromised hosts, anonymizing proxy providers, or similar solutions designed to obfuscate the source IP address of the host.
Cell Tower Triangulation: Integration between the client, the server, and wireless carrier infrastructure could allow the client and server to perform high resolution determination of physical location using cellular signal strength triangulation.
Wi-Fi Access Point Triangulation: A higher resolution method to determine physical location is to triangulate the signal strength of nearby Wifi access points with known physical locations. This method is particularly effective in determining the location of a device within facilities.
Location Displacement Inference: A device's exact location may be unknown, but a statistical probability of location may be used as an approximation for the purpose of evaluating policy. This may be calculated by noting the change in the device's position relative to a starting point with a known location; the user's device may have, in the past, had a known starting point, and in the interim has moved a known or estimate distance and bearing, allowing an approximate location to be calculated. Possible methods to calculate the displacement from the starting point may include inferring distance travelled using measurements gathered from an accelerometer (i.e. using the accelerometer to measure how far the user walked based on gait measurement), changes in signal strength from a known, stationary set of signal sources, and other methods.
FIG. 4 illustrates one embodiment of a method for implementing a location-aware authentication policy. The method may be executed within the context of the system architecture shown inFIGS. 2-3 but is not limited to any particular system architecture.
At401 the client's location is identified using one or more available techniques (e.g., GPS, triangulation, peer/network device detection, etc). At402, one or more location classes (and potentially Boolean combinations of classes) are identified for the current location based on an existing set of policy rules. At403, one or more authentication techniques are identified according to the location class(es). For example, if the client device is currently at a location known to be the user's home or office or within a defined radius of another trusted location, then minimal (or no) authentication may be required. By contrast, if the client device is currently at an unknown location and/or a location known to be untrusted, then more rigorous authentication may be required (e.g., biometric authentication such as a fingerprint scan, PIN entry, etc). At404, the authentication techniques are employed and if authentication is successful, determined at405, then the transaction requiring authentication is authorized at406.
As mentioned above, the level of authentication required may be determined based on the current transaction. For example, a transaction which requires a transfer of a significant amount of money may require a relatively high authentication assurance threshold, whereas non-monetary transaction may require a relatively lower authentication assurance threshold. Thus, the location-aware authentication techniques described herein may be sufficient for certain transactions but may be combined with more rigorous authentication techniques for other transactions.
If authentication is not successful, then the transaction is blocked at407. At this stage, the transaction may be permanently blocked or additional authentication steps may be requested. For example, if the user entered an incorrect PIN, the user may be asked to re-enter the PIN and/or perform biometric authentication.
The embodiments of the invention described herein provide numerous benefits to authentication systems. For example, the described embodiments may be used to efficiently block access from unauthorized locations, reducing unauthorized access by limiting the location from which users are permitted to attempt authentication (e.g., as defined by location classes). In addition, the embodiments of the invention may selectively require stronger authentication to respond to location-specific risks. For example, the relying party can minimize the inconvenience of authentication when a user is entering into a transaction from a known location, while retaining the ability to require stronger authentication when the user/client is connecting from an unknown or unexpected location. Moreover, the embodiments of the invention enable location-aware access to information. Alternatively, a location-centric policy may be used by a relying party to provide a user with additional access to location-specific information. By way of example, and not limitation, a user located in a Walmart may be granted access to special offers from Amazon.com when the user logs into their Amazon.com account on their mobile phone.
As mentioned above, the location of theclient device200 may be determined using a variety of different techniques. In one particular embodiment, the definition of a “location” may not be tied to a set of physical coordinates (as with GPS), but instead be prescribed by the presence of a set of peer devices or other types of network devices. For example, when at work, the client's wireless network adapters (e.g., Wifi adapter, Bluetooth adapter, LTE adapter, etc) may “see” a set of peer network devices (e.g., other computers, mobile phones, tablets, etc) and network infrastructure devices (e.g., Wifi access points, cell towers, etc) on a consistent basis. Thus, the presence of these devices may be used for authentication when the user is at work. Other locations may be defined by the presence of devices in a similar manner such as when the user is at home.
For example, using the techniques described herein, a location may be defined as “with my work colleagues” or “at work” where the presence of a set of peer devices known to be owned by the user's work colleagues may be used as a proxy for the risk that needs to be mitigated by authentication policy. For example, if a user is surrounded by a set of known peer devices or other types of network devices, then the user may be deemed to be less of a risk than if no known devices are detected.
FIG. 5 illustrates one embodiment in which a “location” is defined by a set of peer devices and other network devices. In the illustrated example, theclient device200 “sees” two different peer devices505-506 (e.g., client computers, mobile phones, tablets, etc); two different wireless access points510-511; and two different cell towers520-521. As used herein, theclient device200 may “see” without formally establishing a connection with each of the other devices. For example, the client may see a variety of peer devices connected to the work LAN and/or may see the wireless signals generated by those devices regardless of whether the client connects to those devices. Similarly, theclient device200 may see the basic service set identification (BSSID) for a variety of different Wifi access points (e.g., Wifi from nearby hotels, coffee shops, work Wifi access points). Theclient device200 may also see a variety of different cell towers520-521, potentially even those operated by different cell carriers. The presence of these devices may be used to define a location “fingerprint” for the user's work location.
As illustrated, deviceproximity detection logic501 on theclient device200 may capture data related to visible devices and compare the results against historicaldevice proximity data504. The historicaldevice proximity data504 may be generated over time and/or through a training process. For example, in one embodiment, the user may specify when he/she is at work, at home, or at other locations (either manually, or when prompted to do so by the client200). In response, the deviceproximity detection logic501 may detect the devices in the vicinity and persistently store the results as historicaldevice proximity data504. When the user subsequently returns to the location, the deviceproximity detection logic501 may compare the devices that it currently “sees” against the devices stored ashistorical proximity data504 to generate a correlation between the two. In general, the stronger the correlation, the more likely it is that the client is at the specified location. Over time, devices which are seen regularly may be prioritized above other devices in the historical device proximity data504 (e.g., because these devices tend to provide a more accurate correlation with the user's work location).
In one embodiment, theauthentication policy engine210 may use the correlation results provided by the deviceproximity detection logic501 to determine the level of authentication required by the user for each relyingparty250. For example, if a high correlation exists (i.e., above a specified threshold), then the authentication policy engine may not require explicit authentication by the end user. By contrast, if there is a low correlation between the user's current location and the historical device proximity data504 (i.e., below a specified threshold), then theauthentication policy engine210 may require more rigorous authentication (e.g., a biometric authentication such as a fingerprint scan and/or requesting PIN entry).
In one embodiment, the deviceproximity detection logic501 identifies the set of other devices that are in the client's proximity which have been authenticated. For example, if several of a user's colleagues have already authenticated successfully, then there may be less risk associated with allowing the user to access certain data with a less reliable authenticator, simply because the user is operating in the presence of his/her peers. In this embodiment, peer-to-peer communication over standards such as 802.11n may be used to collect authentication tokens from peers that can be used to prove those peers have already authenticated.
In another embodiment, the deviceproximity detection logic501 may also detect a previously authenticated device that is paired with the user's client (e.g., such as the user's mobile phone or tablet). The presence of another authenticated device that is used by the same user that is attempting to authenticate may be used as an input to the authentication decision, particularly when accessing the same application.
In one embodiment, the historicaldevice proximity data504 is collected and shared across multiple devices, and may be stored and maintained on an intermediate authentication service. For example, a history of groups of peers and network devices in each location may be tracked and stored in a central database accessible to the deviceproximity detection logic501 on each device. This database may then be used as an input to determine the risk of an attempted authentication from a particular location.
Embodiments for Confirming Location Using Supplemental Sensor and/or Location Data
As mentioned above, one embodiment of the invention leverages data fromadditional sensors243 from the mobile device to provide supplemental inputs to the risk calculation used for authentication. These supplemental inputs may provide additional levels of assurance that can help to either confirm or refute claims of the location of the end user's device.
As illustrated inFIG. 6 theadditional sensors243 which provide supplemental assurance of the device's location may includetemperature sensors601,humidity sensors602 and pressure sensors603 (e.g., barometric or altimeter pressure sensors). In one embodiment, the sensors provide temperature, humidity, and pressure readings, respectively, which are used by a supplementaldata correlation module640 of theauthentication policy engine210 to correlate againstsupplemental data610 known about the location provided by the location sensor(s)241 (or the location derived using the various other techniques described herein). The results of the correlation are then used by theauthentication policy module211 to select one ormore authentication techniques212 for a given transaction. As indicated inFIG. 6, thesupplemental location data610 may include data collected from external sources (e.g., the Internet or other mobile devices) and local data sources (e.g., historical data collected during periods when the device is known to be in possession of the legitimate user).
The supplementaldata correlation module640 may use the data provided by theadditional sensors243 in a variety of different ways to correlate against thesupplemental location data610. For example, in one embodiment, thesupplemental location data610 includes current local meteorological conditions at the location provided by the location sensor(s)241. By comparing the humidity, temperature, or barometric pressure gathered from theadditional sensors243 against real-timelocal weather data610, the supplementaldata correlation module640 identifies cases where the sensor data is inconsistent with local conditions. For example, if the client device's GPS reading indicates that the device is outside, yet the temperature, humidity, or barometric pressure are not consistent with the local weather conditions, then the supplementaldata correlation module640 may generate a low correlation score and the location may be deemed less trustworthy. Consequently, theauthentication policy module211 may require more rigorous authentication techniques212 (e.g., fingerprint, PIN entry, etc) to approve a transaction.
As another example, by comparing the altitude provided by analtimeter pressure sensor603 against the known geographical or network topology of the claimed location (provided with the supplemental location data610), the supplementaldata correlation module640 may identify discrepancies that signal the claimed location is not genuine. For example, if a reverse IP lookup of the user's claimed location identifies them as being in the Andes Mountains, but altimeter data from the device indicates the device is at sea level, then the supplementaldata correlation module640 may generate a low correlation score and the location may be deemed less trustworthy. As a result of the low correlation score, theauthentication policy module211 may attempt to mitigate the higher risk with stronger authentication for the transaction.
In one embodiment, the supplementaldata correlation module640 compares data gathered fromsensors243 on the user's device against multiple other end users in the immediate area to identify anomalies that suggest the user is not operating in the same physical location as those known users. For example, if a set of authenticated users are identified who are operating the same physical area, and all of those users' devices note that the local temperature in the area is 10° C., the supplementaldata correlation module640 may generate a low correlation score for an end user whosetemperature sensor601 indicates the local temperature is 20° C. As a result, theauthentication policy211 may require morerigorous authentication techniques212.
As yet another example, the supplementaldata correlation module640 may compare current readings against historical data for a particular user. For example, as mentioned, sensor data may be analyzed during periods of time when the user is known to be in possession of the device200 (e.g., for a time period following an explicit authentication). The supplementaldata correlation module640 may then look for discontinuities in the local data to identify suspicious behavior. For example, if the user's ambient temperature normally floats between 10° C. and 20° C. and it is currently at 30° C., this may indicate the user is not in a typical location, thereby generating a low correlation and causing theauthentication policy module211 to require an additional level of scrutiny for a transaction.
The supplementaldata correlation module640 may perform various different types of correlations between sensor data and supplemental location data while still complying with the underlying principles of the invention. For example, various known correlation mechanisms may be used to determine the statistical relationship between the two sets of data. In one embodiment, the correlation score provided to theauthentication policy engine211 comprises a normalized value (e.g., between 0-1) indicating a level of correlation. In one embodiment, various threshold levels may be set for detected differences between thesensors243 andsupplemental location data610. For example, if thetemperature sensor601 measures a temperature of more than 3 degrees off of the current temperature (gathered from other devices or the Internet), then a first threshold may be triggered (resulting in a lowering of the correlation score). Each additional 3 degrees off from the current temperature may then result in a new threshold being met (resulting in a corresponding lowering of the correlation score). It should be noted, however, that these are merely examples of one embodiment of the invention; the underlying principles of the invention are not limited to any particular manner of performing a correlation.
A method in accordance with one embodiment of the invention is illustrated inFIG. 7. At701, the current location being reported by the client device (e.g., via the GPS module on the device) is read. At702, supplemental location data is collected for the reported location along with sensor data from the client device. As mentioned above, the supplemental location data may be collected locally or remotely (e.g., from other clients and/or servers on the Internet) and may include data such as the current temperature, pressure and/or humidity for the reported location. The sensor data may be provided by temperature sensors, barometric or altimeter pressure sensors, and/or humidity sensors.
At703, a correlation is performed between the supplemental location data and the sensor data provided by the device sensors. In one embodiment, a relatively higher correlation will result in a relatively higher correlation score at704 whereas lower correlations will result in relatively lower correlation scores. As mentioned, in one embodiment, the correlation score is a normalized value (e.g., between 0-1) indicating the similarity between the sensor readings and supplemental data.
At705 one or more authentication techniques are selected based (at least in part) on the correlation score. For example, if a relatively low correlation score is provided, then more rigorous authentication techniques may be selected whereas if a relatively high correlation exists then less rigorous authentication techniques may be selected (potentially those which do not require explicit authentication by the end user).
If the user successfully authenticates using the selected techniques, determined at706, then the transaction is allowed to proceed at707. If not, then the transaction is blocked at708.
Numerous benefits are realized from the above embodiments. For example, these embodiments provide an additional level of assurance for location data gather from other sources: Allows the organization to supplement location data gathered from other sources (IP, GPS, etc) in order to gain additional assurance that the location is authentic. In addition, the embodiments of the invention may block a transaction from an unauthorized location, reducing unauthorized access by limiting the location from which users can even attempt authentication. Moreover, these embodiments may force stronger authentication to respond to location-specific risks (e.g., the relying party can minimize the inconvenience of authentication when the user is accessing information from a known location, while retaining the ability to require stronger authentication when the user/client is accessing from an unknown or unexpected location, or a location whose veracity can't be sufficiently qualified using multiple inputs).
Adaptive Application of Authentication Policy Based on Client Authentication Capabilities
As illustrated inFIG. 8, one embodiment of the invention includes an adaptiveauthentication policy engine845 that allows an organization—e.g., a relying party with secure transaction services250 (hereinafter simply referred to as the “relying party”)—to specify which types of authentication are appropriate for a particular class of interactions. As illustrated, the adaptiveauthentication policy engine845 may be implemented as a module within theauthentication engine811 executed at the relyingparty250. In this embodiment, the adaptiveauthentication policy engine845 executes in accordance with apolicy database825 containing data for existingauthentication devices829, authentication device classes828, interaction classes827, and authentication rules826.
In one embodiment, theauthentication device data829 comprises data associated with each of the explicit user authentication devices220-221 known to be used withclients200. For example, thepolicy database825 may include an entry for a “Validity Model 123” fingerprint sensor along with technical details related to this sensor such as the manner in which the sensor stores sensitive data (e.g., in cryptographically secure hardware,EAL 3 certification, etc) and the false acceptance rate (indicating how reliable the sensor is when generating a user authentication result).
In one embodiment, the authentication device classes828 specify logical groupings ofauthentication devices829 based on the capabilities of those devices. For example, one particular authentication device class828 may be defined for (1) fingerprint sensors (2) that store sensitive data in cryptographically secure hardware that has been EAL 3 certified, and (3) that use a biometric matching process with a false acceptance rate less than 1 in 1000. Another device class828 may be (1) facial recognition devices (2) which do not store sensitive data in cryptographically secure hardware, and (3) that use a biometric matching process with a false acceptance rate less than 1 in 500. Thus, a fingerprint sensor or facial recognition implementation which meets the above criteria will be added to the appropriate authentication device class(es)828.
Various individual attributes may be used to define authentication device classes, such as the type of authentication factor (fingerprint, PIN, face, for example), the level of security assurance of the hardware, the location of storage of secrets, the location where cryptographic operations are performed by the authenticator (e.g., in a secure chip or Secure Enclosure), and a variety of other attributes. Another set of attributes which may be used are related to the location on the client where the “matching” operations are performed. For example, a fingerprint sensor may implement the capture and storage of fingerprint templates in a secure storage on the fingerprint sensor itself, and perform all validation against those templates within the fingerprint sensor hardware itself, resulting in a highly secure environment. Alternatively, the fingerprint sensor may simply be a peripheral that captures images of a fingerprint, but uses software on the main CPU to perform all capture, storage, and comparison operations, resulting in a less secure environment. Various other attributes associated with the “matching” implementation may also be used to define the authentication device classes (e.g., whether the matching is (or is not) performed in a secure element, trusted execution environment (TEE)), or other form of secure execution environment).
Of course, these are merely examples for illustrating the concept of authentication device classes. Various additional authentication device classes may be specified while still complying with the underlying principles. Moreover, it should be noted that, depending on how the authentication device classes are defined, a single authentication device may be categorized into multiple device classes.
In one embodiment, thepolicy database825 may be updated periodically to include data fornew authentication devices829 as they come to market as well as new authentication device classes828, potentially containing new classes into which thenew authentication devices829 may be classified. The updates may be performed by the relying party and/or by a third party responsible for providing the updates for the relying party (e.g., a third party who sells the secure transaction server platforms used by the relying party).
In one embodiment, interaction classes827 are defined based on the particular transactions offered by the relyingparty825. For example, if the relying party is a financial institution, then interactions may be categorized according to the monetary value of the transaction. A “high value interaction” may be defined as one in which an amount of $5000 or more is involved (e.g., transferred, withdrawn, etc); a “medium value interaction” may be defined as one in which an amount between $500 and $4999 is involved; and a “low value transaction” may be defined as one in which an amount of $499 or less is involved.
In addition to the amount of money involved, interaction classes may be defined based on the sensitivity of the data involved. For example, transactions disclosing a user's confidential or otherwise private data may be classified as “confidential disclosure interactions” whereas those which do not disclose such data may be defined as “non-confidential disclosure interactions.” Various other types of interactions may be defined using different variables and a variety of minimum, maximum, and intermediate levels.
Finally, a set of authentication rules826 may be defined which involve theauthentication devices829, authentication device classes827, and/or interaction classes827. By way of example, and not limitation, a particular authentication rule may specify that for “high value transactions” (as specified by an interaction class827) only fingerprint sensors that store sensitive data in cryptographically secure hardware that has been EAL 3 certified, and that use a biometric matching process with a false acceptance rate less than 1 in 1000 (as specified as an authentication device class828) may be used. If a fingerprint device is not available, the authentication rule may define other authentication parameters that are acceptable. For example, the user may be required to enter a PIN or password and also to answer a series of personal questions (e.g., previously provided by the user to the relying party). Any of the above individual attributes specified for authentication devices and/or authentication device classes may be used to define the rules, such as the type of authentication factor (fingerprint, PIN, face, for example), the level of security assurance of the hardware, the location of storage of secrets, the location where cryptographic operations are performed by the authenticator.
Alternatively, or in addition, a rule may specify that certain attributes can take on any value, as long as the other values are sufficient. For example, the relying party may specify that a fingerprint device must be used which stores its seed in hardware and performs computations in hardware, but does not care about the assurance level of the hardware (as defined by an authentication device class828 containing a list of authentication devices meeting these parameters).
Moreover, in one embodiment, a rule may simply specify that onlyspecific authentication devices829 can be used for authenticating a particular type of interaction. For example, the organization can specify that only a “Validity Model 123 fingerprint sensor” is acceptable.
In addition, a rule or set of rules may be used to create ordered, ranked combinations of authentication policies for an interaction. For example, the rules may specify combinations of policies for individual authentication policies, allowing the creation of rich policies that accurate reflect the authentication preferences of the relying party. This would allow, for example, the relying party to specify that fingerprint sensors are preferred, but if none is available, then either trusted platform module (TPM)-based authentication or face recognition are equally preferable as the next best alternatives (e.g., in a prioritized order).
In one embodiment, the adaptiveauthentication policy engine845 implements the authentication rules826, relying on the interaction classes827, authentication device classes828, and/orauthentication device data829, when determining whether to permit a transaction with theclient200. For example, in response to the user of theclient device200 attempting to enter into a transaction with the relying party website or otheronline service846, the adaptiveauthentication policy engine845 may identify a set of one or more interaction classes827 and associated authentication rules826 which are applicable. It may then apply these rules via communication with an adaptiveauthentication policy module850 on the client device200 (illustrated inFIG. 8 as a component within the client's authentication engine810). The adaptiveauthentication policy module850 may then identify a set of one or more authentication techniques812 to comply with the specified authentication policy. For example, if a prioritized set of authentication techniques are specified by the adaptiveauthentication policy engine845 of the relying party, then the adaptiveauthentication policy module850 may select the highest priority authentication technique which is available on theclient200.
The results of the authentication techniques812 are provided to anassurance calculation module840 which generates an assurance level that the current user is the legitimate user. In one embodiment, if the assurance level is sufficiently high, then the client will communicate the results of the successful authentication to theauthentication engine811 of the relying party, which will then permit the transaction.
In one embodiment, data from the client device sensors241-243 may also be used by theassurance calculation module840 to generate the assurance level. For example, the location sensor (e.g., a GPS device) may indicate a current location for theclient device200. If the client device is in an expected location (e.g., home or work), then theassurance calculation module840 may use this information to increase the assurance level. By contrast, if theclient device200 is in an unexpected location (e.g., a foreign country not previously visited by the user), then theassurance calculation module840 may use this information to lower the assurance level (thereby requiring more rigorous explicit user authentication to reach an acceptable assurance level). As discussed above, various additional sensor data such as temperature, humidity, accelerometer data, etc, may be integrated into the assurance level calculation.
The system illustrated inFIG. 8 may operate differently based on specificity with which the client authentication capabilities and other information are communicated to the relying party. For example, in one embodiment, the specific models of each of the explicit user authentication devices220-221 and specific details of the security hardware/software and sensors241-243 on theclient device200 may be communicated to the relyingparty250. As such, in this embodiment, the adaptiveauthentication policy engine845 may specifically identify the desired mode(s) of authentication, based on the authentication rules implemented for the current transaction and the risk associated with the client. For example, the adaptiveauthentication policy module845 may request authentication via the “Validity Model 123” fingerprint sensor installed on the client for a given transaction.
In another embodiment, only a generic description of the authentication capabilities of theclient device200 may be provided to protect the user's privacy. For example, the client device may communicate that it has a fingerprint sensor that stores sensitive data in a cryptographically secure hardware that has been EAL 3 certified and/or that uses a biometric matching process with a false acceptance rate less than 1 in N. It may specify similar generic information related to the capabilities and specifications of other authentication devices, without disclosing the specific models of those devices. The adaptiveauthentication policy engine845 may then use this general information to categorize the authentication devices in applicable authentication device classes838 within thedatabase825. In response to a request to perform a transaction, the adaptiveauthentication policy module845 may then instruct theclient device200 to use a particular authentication device if its class is sufficient to complete the transaction.
In yet another embodiment, theclient device200 does not communicate any data related to its authentication capabilities to the relying party. Rather, in this embodiment, the adaptiveauthentication policy module845 communicates the level of authentication required and the adaptiveauthentication policy module850 on the client selects one or more authentication techniques which meet that level of authentication. For example, the adaptiveauthentication policy module845 may communicate that the current transaction is classified as a “high value transaction” (as specified by an interaction class827) for which only certain classes of authentication devices may be used. As mentioned, it may also communicate the authentication classes in a prioritized manner. Based on this information, the adaptiveauthentication policy module850 on the client may then select one or more authentication techniques812 required for the current transaction.
As indicated inFIG. 8, theclient device200 may include its own policy database(s)890 to store/cache policy data for each relying party. The policy database890 may comprise a subset of the data stored within thepolicy database825 of the relying party. In one embodiment, a different set of policy data is stored in the database890 for each relying party (reflecting the different authentication policies of each relying party). In these embodiments, the mere indication of a particular category of transaction (e.g., a “high value transaction,” “low value transaction”, etc) may be sufficient information for the adaptiveauthentication policy module850 on theclient device200 to select the necessary authentication techniques812 (i.e., because the rules associated with the various transaction types are available within the local policy database890). As such, the adaptiveauthentication policy module845 may simply indicate the interaction class of the current transaction, which the adaptiveauthentication policy module850 uses to identify the authentication techniques812 based on the rules associated with that interaction class.
A method for performing adaptive authentication based on client device capabilities is illustrated inFIG. 9. The method may be implemented on the system illustrated inFIG. 8, but is not limited to any particular system architecture.
At901 a client attempts to perform a transaction with a relying party. By way of example, and not limitation, the client may enter payment information for an online purchase or attempt to transfer funds between bank accounts. At902, the transaction is categorized. For example, as discussed above, the transaction may be associated with a particular interaction class based on variables such as the amount of money involved or the sensitivity of information involved.
At903, one or more rules associated with the category of transaction are identified. Returning to the above example, if the transaction is categorized as a “high value transaction” then a rule associated with this transaction type may be selected. At904, the rule(s) associated with the transaction type are executed and, as discussed above, information is sent to the client indicating the authentication requirements to complete the transaction. As discussed above, this may involve identifying specific authentication devices, identifying classes of authentication devices, or merely indicating the particular rule which needs to be implemented (e.g., if the client maintains local copies of the rules).
In any case, at905 a set of one or more authentication techniques are selected based on the requirements specified via the rule(s) and the authentication capabilities of the client. If authentication is successful, determined at906, then the transaction is permitted at907. If not, then the transaction is blocked at908 (or additional authentication is requested from the user).
There are numerous benefits realized from the embodiments of the invention described herein. For example, these embodiments reduce the effort required to integrate authentication capabilities at the relying party. For example, instead of writing code to codify an authentication policy, rules can be configured through a simple graphical user interface. All the relying party needs to do to integrate is define a policy for a class of interactions (for example: “Large Money Transfers”) and have the integration code use that policy identifier when interacting with the policy engine to determine the correct authentication mechanism to leverage.
Moreover, these embodiments simplify authentication policy administration. By expressing the authentication policy outside of code, this approach allows the organization to easily update their authentication policies without requiring code changes. Changes to reflect new interpretations of regulatory mandates, or respond to attacks on existing authentication mechanisms become a simple change in the policy, and can be effected quickly.
Finally, these embodiments allow for future refinement of authentication techniques. As new authentication devices become available, an organization can evaluate its appropriateness to addressing new or emerging risks. Integrating a newly available authentication device only requires adding the authentication device to a policy; no new code has to be written to deploy the new capability immediately.
Exemplary System Architectures
It should be noted that the term “relying party” is used herein to refer, not merely to the entity with which a user transaction is attempted (e.g., a Website or online service performing user transactions), but also to the secure transaction servers implemented on behalf of that entity which may performed the underlying authentication techniques described herein. The secure transaction servers may be owned and/or under the control of the relying party or may be under the control of a third party offering secure transaction services to the relying party as part of a business arrangement. These distinctions are indicated inFIGS. 10A-B discussed below which show that the “relying party” may includeWebsites1031 andother network services1051 as well as the secure transaction servers1032-1033 for performing the authentication techniques on behalf of the websites and network services.
In particular,FIGS. 10A-B illustrate two embodiments of a system architecture comprising client-side and server-side components for authenticating a user. The embodiment shown inFIG. 10A uses a browser plugin-based architecture for communicating with a website while the embodiment shown inFIG. 10B does not require a browser. The various techniques described herein for adaptively implementing an authentication policy may be employed on either of these system architectures. For example, theauthentication engine811 at the relying party andlocal authentication engine810 on the client inFIG. 8 may be implemented as part of thesecure transaction service1001 includinginterface1002. It should be noted, however, that the embodiment illustrated inFIG. 8 stands on its own and may be implemented using logical arrangements of hardware and software other than those shown inFIGS. 10A-B.
Turning toFIG. 10A, the illustrated embodiment includes aclient1000 equipped with one or more authentication devices1010-1012 for enrolling and authenticating an end user. As mentioned above, the authentication devices1010-1012 may include biometric devices such as fingerprint sensors, voice recognition hardware/software (e.g., a microphone and associated software for recognizing a user's voice), facial recognition hardware/software (e.g., a camera and associated software for recognizing a user's face), and optical recognition capabilities (e.g., an optical scanner and associated software for scanning the retina of a user) and non-biometric devices such as a trusted platform modules (TPMs) and smartcards. A user may enroll the biometric devices by providing biometric data (e.g., swiping a finger on the fingerprint device) which thesecure transaction service1001 may store as biometric template data in secure storage1020 (via interface1002).
While thesecure storage1020 is illustrated outside of the secure perimeter of the authentication device(s)1010-1012, in one embodiment, each authentication device1010-1012 may have its own integrated secure storage. Additionally, each authentication device1010-1012 may cryptographically protect the biometric reference data records (e.g., wrapping them using a symmetric key to make thestorage1020 secure).
The authentication devices1010-1012 are communicatively coupled to the client through an interface1002 (e.g., an application programming interface or API) exposed by asecure transaction service1001. Thesecure transaction service1001 is a secure application for communicating with one or more secure transaction servers1032-1033 over a network and for interfacing with asecure transaction plugin1005 executed within the context of aweb browser1004. As illustrated, theInterface1002 may also provide secure access to asecure storage device1020 on theclient1000 which stores information related to each of the authentication devices1010-1012 such as a device identification code, user identification code, user enrollment data (e.g., scanned fingerprint or other biometric data), and keys used to perform the secure authentication techniques described herein. For example, as discussed in detail below, a unique key may be stored into each of the authentication devices and used when communicating toservers1030 over a network such as the Internet.
In addition to enrollment of devices, thesecure transaction service1001 may then register the biometric devices with the secure transaction servers1032-1033 over the network and subsequently authenticate with those servers using data exchanged during the registration process (e.g., encryption keys provisioned into the biometric devices). The authentication process may include any of the authentication techniques described herein (e.g., generating an assurance level on theclient1000 based on explicit or non-intrusive authentication techniques and transmitting the results to the secure transaction servers1032-1033).
As discussed below, certain types of network transactions are supported by thesecure transaction plugin1005 such as HTTP or HTTPS transactions withwebsites1031 or other servers. In one embodiment, the secure transaction plugin is initiated in response to specific HTML tags inserted into the HTML code of a web page by theweb server1031 within the secure enterprise or Web destination1030 (sometimes simply referred to below as “server1030”). In response to detecting such a tag, thesecure transaction plugin1005 may forward transactions to thesecure transaction service1001 for processing. In addition, for certain types of transactions (e.g., such as secure key exchange) thesecure transaction service1001 may open a direct communication channel with the on-premises transaction server1032 (i.e., co-located with the website) or with an off-premises transaction server1033.
The secure transaction servers1032-1033 are coupled to asecure transaction database1040 for storing user data, authentication device data, keys and other secure information needed to support the secure authentication transactions described below. It should be noted, however, that the underlying principles of the invention do not require the separation of logical components within the secure enterprise orweb destination1030 shown inFIG. 10A. For example, thewebsite1031 and the secure transaction servers1032-1033 may be implemented within a single physical server or separate physical servers. Moreover, thewebsite1031 and transaction servers1032-1033 may be implemented within an integrated software module executed on one or more servers for performing the functions described below.
As mentioned above, the underlying principles of the invention are not limited to a browser-based architecture shown inFIG. 10A.FIG. 10B illustrates an alternate implementation in which a stand-alone application1054 utilizes the functionality provided by thesecure transaction service1001 to authenticate a user over a network. In one embodiment, theapplication1054 is designed to establish communication sessions with one ormore network services1051 which rely on the secure transaction servers1032-1033 for performing the user/client authentication techniques described in detail below.
In either of the embodiments shown inFIGS. 10A-B, the secure transaction servers1032-1033 may generate the keys which are then securely transmitted to thesecure transaction service1001 and stored into the authentication devices within thesecure storage1020. Additionally, the secure transaction servers1032-1033 manage thesecure transaction database1040 on the server side.
Embodiments of the invention may include various steps as set forth above. The steps may be embodied in machine-executable instructions which cause a general-purpose or special-purpose processor to perform certain steps. Alternatively, these steps may be performed by specific hardware components that contain hardwired logic for performing the steps, or by any combination of programmed computer components and custom hardware components.
Elements of the present invention may also be provided as a machine-readable medium for storing the machine-executable program code. The machine-readable medium may include, but is not limited to, floppy diskettes, optical disks, CD-ROMs, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cards, or other type of media/machine-readable medium suitable for storing electronic program code.
Throughout the foregoing description, for the purposes of explanation, numerous specific details were set forth in order to provide a thorough understanding of the invention. It will be apparent, however, to one skilled in the art that the invention may be practiced without some of these specific details. For example, it will be readily apparent to those of skill in the art that the functional modules and methods described herein may be implemented as software, hardware or any combination thereof. Moreover, although some embodiments of the invention are described herein within the context of a mobile computing environment, the underlying principles of the invention are not limited to a mobile computing implementation. Virtually any type of client or peer data processing devices may be used in some embodiments including, for example, desktop or workstation computers. Accordingly, the scope and spirit of the invention should be judged in terms of the claims which follow.

Claims (28)

I claim:
1. A method for user authentication comprising:
initially defining a plurality of authentication device classes based on characteristics of client authentication devices, the characteristics comprising a type of authentication device and a level of security assurance of the client device's hardware and/or software;
initially defining a plurality of interaction classes for a relying party, the interaction classes defined based on variables associated with interactions between a client and the relying party, the variables including an amount of money or a level of sensitivity of information involved in the interactions;
initially defining one or more authentication rule sets specifying authentication devices or classes of authentication devices to be used for different interaction classes, the one or more authentication rule sets comprising a first rule set;
detecting, by a secure transaction services engine, a user of a client attempting to perform a current interaction with a relying party over a network; and
responsively identifying a first interaction class for the current interaction, by an adaptive authentication policy hardware engine, based on variables associated with the current interaction and
implementing a first rule set of one or more authentication rules associated with the first interaction class to authenticate the user of the client, wherein implementing the first rule set of one or more authentication rules comprises the adaptive authentication policy hardware engine implementing a first rule specifying a particular authentication device class required to authenticate the user for the current interaction, wherein the first rule comprises a prioritized list of acceptable authentication device classes for the current interaction.
2. The method as inclaim 1 further comprising:
initially classifying a plurality of authentication device models into the plurality of authentication device classes based on characteristics of the authentication device models.
3. The method as inclaim 1 wherein the client selects a first authentication device to be used for authentication based on the prioritized list of acceptable authentication device classes.
4. The method as inclaim 1 wherein the variables associated with the current interaction comprises an amount of money or sensitivity of data involved in the current interaction.
5. The method as inclaim 1 wherein the type of authentication device includes fingerprint authentication, PIN or password entry, face recognition authentication, voice recognition authentication, authentication using a trusted platform module (TPM) device, and/or retinal scanning authentication.
6. The method as inclaim 2 wherein at least one authentication device class is defined to have a particular authentication factor with a false acceptance rate below a specified threshold.
7. The method as inclaim 2 wherein at least one authentication device class is defined based on where and/or how a matching algorithm is implemented to match biometric data extracted from an authentication device with biometric template data stored in a secure storage.
8. The method as inclaim 7 wherein the authentication device class is defined based on the matching algorithm being, or not being implemented within a secure execution environment.
9. The method as inclaim 6 wherein the one authentication device class is further defined to store sensitive data in cryptographically secure hardware and/or software.
10. The method as inclaim 3 further comprising:
generating an assurance level based, at least in part, on a user authentication with the first authentication device.
11. The method as inclaim 10 wherein the interaction is permitted if the assurance level is above a specified threshold.
12. The method as inclaim 11 wherein the assurance level is generated, at least in part, based on current sensor data read from client sensors, wherein at least one of the sensors comprises a location sensor providing a current location of the client.
13. An authentication system comprising:
an authentication policy database to store authentication policies for a relying party;
a secure transaction services engine of the relying party to detect a user of a client attempting to perform a current interaction with the relying party over a network;
an adaptive authentication policy hardware engine of the relying party to perform operations of:
initially define a plurality of interaction classes in the authentication policy database, the interaction classes defined based on variables associated with interactions between the client and the relying party, the variables including an amount of money or a level of sensitivity of information involved in the interactions;
initially define one or more authentication rule sets in the authentication policy database specifying authentication devices or classes of authentication devices to be used for different interaction classes, the one or more authentication rule sets comprising a first rule set; and
query the authentication policy database to identify a first interaction class for the current interaction based on variables associated with the current interaction and to implement the first rule set of one or more authentication rules associated with the first interaction class to authenticate the user of the client, wherein implementing a first rule set of one or more authentication rules comprises the adaptive authentication policy hardware engine implementing a first rule specifying a particular authentication device class required to authenticate the user for the current interaction, the first rule comprising a prioritized list of acceptable authentication device classes for the current interaction, and wherein the adaptive authentication policy hardware engine is to perform additional operations of initially defining a plurality of authentication device classes in the authentication policy database based on characteristics of client authentication devices, the characteristics comprising a type of authentication device and a level of security assurance of the client device's hardware and/or software.
14. The authentication system as inclaim 13 further comprising:
initially classifying a plurality of authentication device models into the plurality of authentication device classes in the authentication policy database based on characteristics of the authentication device models.
15. The authentication system as inclaim 13 wherein the client selects a first authentication device to be used for authentication based on the prioritized list of acceptable authentication device classes.
16. The authentication system as inclaim 13 wherein the variables associated with the current interaction comprises an amount of money or sensitivity of data involved in the current interaction.
17. The authentication system as inclaim 13 wherein the type of authentication device includes fingerprint authentication, PIN or password entry, face recognition authentication, voice recognition authentication, authentication using a trusted platform module (TPM) device, and/or retinal scanning authentication.
18. The authentication system as inclaim 14 wherein at least one authentication device class is defined to have a particular authentication factor with a false acceptance rate below a specified threshold.
19. The authentication system as inclaim 14 wherein at least one authentication device class is defined based on where and/or how a matching algorithm is implemented to match biometric data extracted from an authentication device with biometric template data stored in a secure storage.
20. The authentication system as inclaim 19 wherein the authentication device class is defined based on the matching algorithm being, or not being implemented within a secure execution environment.
21. The authentication system as inclaim 18 wherein the one authentication device class is further defined to store sensitive data in cryptographically secure hardware and/or software.
22. The authentication system as inclaim 15 further comprising:
the client generating an assurance level based, at least in part, on a user authentication with the first authentication device.
23. The authentication system as inclaim 22 wherein the interaction is permitted if the assurance level is above a specified threshold.
24. The authentication system as inclaim 23 wherein the assurance level is generated, at least in part, based on current sensor data read from client sensors, wherein at least one of the sensors comprises a location sensor providing a current location of the client.
25. The method as inclaim 1, wherein the characteristics of client authentication devices further comprises a type of location in which secrets are stored.
26. The method as inclaim 1, wherein the characteristics of client authentication devices further comprises a type of location where cryptographic operations are performed by the authentication devices.
27. The authentication system as inclaim 13, wherein the characteristics of client authentication devices further comprises a type of location in which secrets are stored.
28. The authentication system as inclaim 13, wherein the characteristics of client authentication devices further comprises a type of location where cryptographic operations are performed by the authentication devices.
US14/218,6462013-03-222014-03-18System and method for adaptive application of authentication policiesActive2034-11-05US10776464B2 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US14/218,646US10776464B2 (en)2013-03-222014-03-18System and method for adaptive application of authentication policies

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US201361804568P2013-03-222013-03-22
US14/218,646US10776464B2 (en)2013-03-222014-03-18System and method for adaptive application of authentication policies

Publications (2)

Publication NumberPublication Date
US20140289790A1 US20140289790A1 (en)2014-09-25
US10776464B2true US10776464B2 (en)2020-09-15

Family

ID=51569865

Family Applications (12)

Application NumberTitlePriority DateFiling Date
US14/145,439ActiveUS9396320B2 (en)2013-03-222013-12-31System and method for non-intrusive, privacy-preserving authentication
US14/145,533ActiveUS9305298B2 (en)2013-03-222013-12-31System and method for location-based authentication
US14/145,607ActiveUS9367676B2 (en)2013-03-222013-12-31System and method for confirming location using supplemental sensor and/or location data
US14/145,466Active2036-01-03US10706132B2 (en)2013-03-222013-12-31System and method for adaptive user authentication
US14/218,611AbandonedUS20140289116A1 (en)2013-03-222014-03-18System and method for performing authentication for a local transaction
US14/218,575ActiveUS10366218B2 (en)2013-03-222014-03-18System and method for collecting and utilizing client data for risk assessment during authentication
US14/218,743Active2035-03-30US10176310B2 (en)2013-03-222014-03-18System and method for privacy-enhanced data synchronization
US14/218,646Active2034-11-05US10776464B2 (en)2013-03-222014-03-18System and method for adaptive application of authentication policies
US14/218,677Active2035-10-12US10762181B2 (en)2013-03-222014-03-18System and method for user confirmation of online transactions
US14/218,551ActiveUS9898596B2 (en)2013-03-222014-03-18System and method for eye tracking during authentication
US14/218,692Active2034-07-07US10268811B2 (en)2013-03-222014-03-18System and method for delegating trust to a new authenticator
US15/900,620ActiveUS10282533B2 (en)2013-03-222018-02-20System and method for eye tracking during authentication

Family Applications Before (7)

Application NumberTitlePriority DateFiling Date
US14/145,439ActiveUS9396320B2 (en)2013-03-222013-12-31System and method for non-intrusive, privacy-preserving authentication
US14/145,533ActiveUS9305298B2 (en)2013-03-222013-12-31System and method for location-based authentication
US14/145,607ActiveUS9367676B2 (en)2013-03-222013-12-31System and method for confirming location using supplemental sensor and/or location data
US14/145,466Active2036-01-03US10706132B2 (en)2013-03-222013-12-31System and method for adaptive user authentication
US14/218,611AbandonedUS20140289116A1 (en)2013-03-222014-03-18System and method for performing authentication for a local transaction
US14/218,575ActiveUS10366218B2 (en)2013-03-222014-03-18System and method for collecting and utilizing client data for risk assessment during authentication
US14/218,743Active2035-03-30US10176310B2 (en)2013-03-222014-03-18System and method for privacy-enhanced data synchronization

Family Applications After (4)

Application NumberTitlePriority DateFiling Date
US14/218,677Active2035-10-12US10762181B2 (en)2013-03-222014-03-18System and method for user confirmation of online transactions
US14/218,551ActiveUS9898596B2 (en)2013-03-222014-03-18System and method for eye tracking during authentication
US14/218,692Active2034-07-07US10268811B2 (en)2013-03-222014-03-18System and method for delegating trust to a new authenticator
US15/900,620ActiveUS10282533B2 (en)2013-03-222018-02-20System and method for eye tracking during authentication

Country Status (1)

CountryLink
US (12)US9396320B2 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10970197B2 (en)*2019-06-132021-04-06International Business Machines CorporationBreakpoint value-based version control
US11099975B2 (en)2019-01-242021-08-24International Business Machines CorporationTest space analysis across multiple combinatoric models
US11100204B2 (en)*2018-07-192021-08-24Motorola Mobility LlcMethods and devices for granting increasing operational access with increasing authentication factors
US11106567B2 (en)2019-01-242021-08-31International Business Machines CorporationCombinatoric set completion through unique test case generation
US20210342425A1 (en)*2017-06-042021-11-04Harsha RamalingamSelf-owned authentication and identity framework
US11232020B2 (en)2019-06-132022-01-25International Business Machines CorporationFault detection using breakpoint value-based fingerprints of failing regression test cases
US11263116B2 (en)2019-01-242022-03-01International Business Machines CorporationChampion test case generation
US11301551B2 (en)*2017-07-062022-04-12Ebay Inc.Computing asset access control
US20220261496A1 (en)*2020-05-132022-08-18Capital One Services, LlcSecuring Confidential Information During a Telecommunication Session
US11422924B2 (en)2019-06-132022-08-23International Business Machines CorporationCustomizable test set selection using code flow trees

Families Citing this family (452)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20230336342A1 (en)2005-01-272023-10-19The Chamberlain Group LlcMethod and apparatus to facilitate transmission of an encrypted rolling code
US9148409B2 (en)2005-06-302015-09-29The Chamberlain Group, Inc.Method and apparatus to facilitate message transmission and reception using different transmission characteristics
USRE48433E1 (en)2005-01-272021-02-09The Chamberlain Group, Inc.Method and apparatus to facilitate transmission of an encrypted rolling code
US8422667B2 (en)2005-01-272013-04-16The Chamberlain Group, Inc.Method and apparatus to facilitate transmission of an encrypted rolling code
US20080201158A1 (en)2007-02-152008-08-21Johnson Mark DSystem and method for visitation management in a controlled-access environment
US9456054B2 (en)2008-05-162016-09-27Palo Alto Research Center IncorporatedControlling the spread of interests and content in a content centric network
US8923293B2 (en)2009-10-212014-12-30Palo Alto Research Center IncorporatedAdaptive multi-interface use for content networking
US9773288B2 (en)*2009-11-172017-09-26Endera Systems, LlcRadial data visualization system
US20140095169A1 (en)*2010-12-202014-04-03Auraya Pty LtdVoice authentication system and methods
CN103828289B (en)*2011-09-272017-08-22皇家飞利浦有限公司Group membership is to a group secret management
US9619852B2 (en)*2012-04-172017-04-11Zighra Inc.Context-dependent authentication system, method and device
US20150073987A1 (en)2012-04-172015-03-12Zighra Inc.Fraud detection system, method, and device
US9445387B2 (en)*2012-06-012016-09-13Korea Advanced Institute Of Science And TechnologyMethod and apparatus for building Wi-Fi radio map
US9247432B2 (en)*2012-10-192016-01-26Airwatch LlcSystems and methods for controlling network access
US9280546B2 (en)2012-10-312016-03-08Palo Alto Research Center IncorporatedSystem and method for accessing digital content using a location-independent name
US9400800B2 (en)2012-11-192016-07-26Palo Alto Research Center IncorporatedData transport by named content synchronization
US10430839B2 (en)2012-12-122019-10-01Cisco Technology, Inc.Distributed advertisement insertion in content-centric networks
US9978025B2 (en)2013-03-202018-05-22Cisco Technology, Inc.Ordered-element naming for name-based packet forwarding
US10270748B2 (en)2013-03-222019-04-23Nok Nok Labs, Inc.Advanced authentication techniques and applications
US9887983B2 (en)2013-10-292018-02-06Nok Nok Labs, Inc.Apparatus and method for implementing composite authenticators
US9396320B2 (en)2013-03-222016-07-19Nok Nok Labs, Inc.System and method for non-intrusive, privacy-preserving authentication
US9515836B2 (en)*2013-03-282016-12-06Xerox CorporationSystem and method for location assurance using passive computational tags
JP2014197759A (en)*2013-03-292014-10-16富士通株式会社Presence management method, information processing device, and program
US10235511B2 (en)2013-04-192019-03-19Pearson Education, Inc.Authentication integrity protection
US10693874B2 (en)2013-04-192020-06-23Pearson Education, Inc.Authentication integrity protection
US9760785B2 (en)*2013-05-082017-09-12Jpmorgan Chase Bank, N.A.Systems and methods for high fidelity multi-modal out-of-band biometric authentication
US9935791B2 (en)2013-05-202018-04-03Cisco Technology, Inc.Method and system for name resolution across heterogeneous architectures
US9185120B2 (en)2013-05-232015-11-10Palo Alto Research Center IncorporatedMethod and system for mitigating interest flooding attacks in content-centric networks
US9961077B2 (en)2013-05-302018-05-01Nok Nok Labs, Inc.System and method for biometric authentication with device attestation
PL3011713T3 (en)*2013-06-202019-08-30Entrust Datacard Denmark A/SMethod and system protecting against identity theft or replication abuse
US9444722B2 (en)2013-08-012016-09-13Palo Alto Research Center IncorporatedMethod and apparatus for configuring routing paths in a custodian-based routing architecture
US9384359B2 (en)*2013-08-012016-07-05Palo Alto Research Center IncorporatedInformation firewall
US9350717B1 (en)2013-09-232016-05-24Amazon Technologies, Inc.Location service for user authentication
US9118809B2 (en)*2013-10-112015-08-25Edifire LLCMethods and systems for multi-factor authentication in secure media-based conferencing
US9118654B2 (en)2013-10-112015-08-25Edifire LLCMethods and systems for compliance monitoring in secure media-based conferencing
US8970659B1 (en)2013-10-112015-03-03Edifire LLCMethods and systems for secure media-based conferencing
US9860235B2 (en)*2013-10-172018-01-02Arm Ip LimitedMethod of establishing a trusted identity for an agent device
US10069811B2 (en)2013-10-172018-09-04Arm Ip LimitedRegistry apparatus, agent device, application providing apparatus and corresponding methods
US9307405B2 (en)2013-10-172016-04-05Arm Ip LimitedMethod for assigning an agent device from a first device registry to a second device registry
US9407549B2 (en)2013-10-292016-08-02Palo Alto Research Center IncorporatedSystem and method for hash-based forwarding of packets with hierarchically structured variable-length identifiers
US9282050B2 (en)2013-10-302016-03-08Palo Alto Research Center IncorporatedSystem and method for minimum path MTU discovery in content centric networks
US9276840B2 (en)2013-10-302016-03-01Palo Alto Research Center IncorporatedInterest messages with a payload for a named data network
US9401864B2 (en)2013-10-312016-07-26Palo Alto Research Center IncorporatedExpress header for packets with hierarchically structured variable-length identifiers
US10101801B2 (en)2013-11-132018-10-16Cisco Technology, Inc.Method and apparatus for prefetching content in a data stream
US10129365B2 (en)2013-11-132018-11-13Cisco Technology, Inc.Method and apparatus for pre-fetching remote content based on static and dynamic recommendations
US9311377B2 (en)2013-11-132016-04-12Palo Alto Research Center IncorporatedMethod and apparatus for performing server handoff in a name-based content distribution system
US10089655B2 (en)2013-11-272018-10-02Cisco Technology, Inc.Method and apparatus for scalable data broadcasting
US9503358B2 (en)2013-12-052016-11-22Palo Alto Research Center IncorporatedDistance-based routing in an information-centric network
US10671993B2 (en)*2013-12-112020-06-02Visa International Service AssociationLocation-based mobile access device configuration system and method
US9379979B2 (en)2014-01-142016-06-28Palo Alto Research Center IncorporatedMethod and apparatus for establishing a virtual interface for a set of mutual-listener devices
US10172068B2 (en)2014-01-222019-01-01Cisco Technology, Inc.Service-oriented routing in software-defined MANETs
US10098051B2 (en)2014-01-222018-10-09Cisco Technology, Inc.Gateways and routing in software-defined manets
US9374304B2 (en)2014-01-242016-06-21Palo Alto Research Center IncorporatedEnd-to end route tracing over a named-data network
US9531679B2 (en)2014-02-062016-12-27Palo Alto Research Center IncorporatedContent-based transport security for distributed producers
US9954678B2 (en)2014-02-062018-04-24Cisco Technology, Inc.Content-based transport security
US9390242B2 (en)2014-02-072016-07-12Bank Of America CorporationDetermining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements
US20150227924A1 (en)*2014-02-072015-08-13Bank Of America CorporationDetermining authentication requirements along a continuum based on a current state of the user and/or the service requiring authentication
US9317673B2 (en)2014-02-072016-04-19Bank Of America CorporationProviding authentication using previously-validated authentication credentials
US9313190B2 (en)2014-02-072016-04-12Bank Of America CorporationShutting down access to all user accounts
US9305149B2 (en)2014-02-072016-04-05Bank Of America CorporationSorting mobile banking functions into authentication buckets
US9647999B2 (en)2014-02-072017-05-09Bank Of America CorporationAuthentication level of function bucket based on circumstances
US9965606B2 (en)2014-02-072018-05-08Bank Of America CorporationDetermining user authentication based on user/device interaction
US9223951B2 (en)2014-02-072015-12-29Bank Of America CorporationUser authentication based on other applications
US9213974B2 (en)2014-02-072015-12-15Bank Of America CorporationRemote revocation of application access based on non-co-location of a transaction vehicle and a mobile device
US9317674B2 (en)2014-02-072016-04-19Bank Of America CorporationUser authentication based on fob/indicia scan
US9286450B2 (en)2014-02-072016-03-15Bank Of America CorporationSelf-selected user access based on specific authentication types
US9331994B2 (en)2014-02-072016-05-03Bank Of America CorporationUser authentication based on historical transaction data
US9208301B2 (en)2014-02-072015-12-08Bank Of America CorporationDetermining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location
US20150227926A1 (en)*2014-02-072015-08-13Bank Of America CorporationDetermining user authentication requirements based on the current location of the user in comparison to a user's travel route
US20150227735A1 (en)*2014-02-132015-08-13Robert ChappellSystem and method for eye tracking authentication
US9678998B2 (en)2014-02-282017-06-13Cisco Technology, Inc.Content name resolution for information centric networking
US11288346B1 (en)2014-03-032022-03-29Charles Schwab & Co., Inc.System and method for authenticating users using weak authentication techniques, with differences for different features
US10089651B2 (en)2014-03-032018-10-02Cisco Technology, Inc.Method and apparatus for streaming advertisements in a scalable data broadcasting system
US9928532B2 (en)*2014-03-042018-03-27Daniel TorresImage based search engine
US9836540B2 (en)2014-03-042017-12-05Cisco Technology, Inc.System and method for direct storage access in a content-centric network
US9686077B2 (en)*2014-03-062017-06-20Microsoft Technology Licensing, LlcSecure hardware for cross-device trusted applications
US9391896B2 (en)2014-03-102016-07-12Palo Alto Research Center IncorporatedSystem and method for packet forwarding using a conjunctive normal form strategy in a content-centric network
US9626413B2 (en)2014-03-102017-04-18Cisco Systems, Inc.System and method for ranking content popularity in a content-centric network
US9473405B2 (en)2014-03-102016-10-18Palo Alto Research Center IncorporatedConcurrent hashes and sub-hashes on data streams
US10248770B2 (en)*2014-03-172019-04-02Sensory, IncorporatedUnobtrusive verification of user identity
US9407432B2 (en)2014-03-192016-08-02Palo Alto Research Center IncorporatedSystem and method for efficient and secure distribution of digital content
US9916601B2 (en)2014-03-212018-03-13Cisco Technology, Inc.Marketplace for presenting advertisements in a scalable data broadcasting system
US9363179B2 (en)2014-03-262016-06-07Palo Alto Research Center IncorporatedMulti-publisher routing protocol for named data networks
US9363086B2 (en)2014-03-312016-06-07Palo Alto Research Center IncorporatedAggregate signing of data in content centric networking
US10382398B2 (en)*2014-03-312019-08-13Sonicwall Inc.Application signature authorization
US9716622B2 (en)2014-04-012017-07-25Cisco Technology, Inc.System and method for dynamic name configuration in content-centric networks
US9473576B2 (en)2014-04-072016-10-18Palo Alto Research Center IncorporatedService discovery using collection synchronization with exact names
US9390289B2 (en)2014-04-072016-07-12Palo Alto Research Center IncorporatedSecure collection synchronization using matched network names
US10075521B2 (en)2014-04-072018-09-11Cisco Technology, Inc.Collection synchronization using equality matched network names
WO2015157295A1 (en)*2014-04-082015-10-15Capital One Financial CorporationSystems and methods for transacting at an atm using a mobile device
US9451032B2 (en)2014-04-102016-09-20Palo Alto Research Center IncorporatedSystem and method for simple service discovery in content-centric networks
US10121142B2 (en)*2014-04-112018-11-06Bank Of America CorporationUser authentication by token and comparison to visitation pattern
US20150302422A1 (en)*2014-04-162015-10-222020 Ip LlcSystems and methods for multi-user behavioral research
US9203885B2 (en)2014-04-282015-12-01Palo Alto Research Center IncorporatedMethod and apparatus for exchanging bidirectional streams over a content centric network
US12124545B2 (en)2014-04-292024-10-22Taliware, Inc.Communication network based non-fungible token creation platform with integrated creator biometric authentication
US11039314B2 (en)2014-04-292021-06-15Taliware, Inc.Method for passive authentication of an individual using an individual's geo-location via a communication network and blockchain associated recording of individual's authentication data
US9801058B2 (en)*2014-04-292017-10-24Tarik TaliMethod and system for authenticating an individual's geo-location via a communication network and applications using the same
US10708778B2 (en)2014-04-292020-07-07Taliware, Inc.Method and system for authenticating an individual's geo-location via a communication network and applications using the same
US9992281B2 (en)2014-05-012018-06-05Cisco Technology, Inc.Accountable content stores for information centric networks
US9654469B1 (en)2014-05-022017-05-16Nok Nok Labs, Inc.Web-based user authentication techniques and applications
US9577999B1 (en)2014-05-022017-02-21Nok Nok Labs, Inc.Enhanced security for registration of authentication devices
US11100499B1 (en)2014-05-072021-08-24Google LlcLocation modeling using transaction data for validation
AU2015255652B2 (en)*2014-05-092018-03-29Google LlcSystems and methods for using eye signals with secure mobile communications
US10564714B2 (en)2014-05-092020-02-18Google LlcSystems and methods for biomechanically-based eye signals for interacting with real and virtual objects
US9710629B2 (en)*2014-05-132017-07-18Google Technology Holdings LLCElectronic device with method for controlling access to same
US9727859B1 (en)*2014-05-202017-08-08Carolina Coupon Clearing, Inc.Methods, systems, and computer program products for using shopper credentials to initiate payment for a purchase by matching the credentials with an open approval from a financial institution
US9609014B2 (en)2014-05-222017-03-28Cisco Systems, Inc.Method and apparatus for preventing insertion of malicious content at a named data network router
US9455835B2 (en)2014-05-232016-09-27Palo Alto Research Center IncorporatedSystem and method for circular link resolution with hash-based names in content-centric networks
US9276751B2 (en)2014-05-282016-03-01Palo Alto Research Center IncorporatedSystem and method for circular link resolution with computable hash-based names in content-centric networks
US9633184B2 (en)2014-05-302017-04-25Google Inc.Dynamic authorization
US10225248B2 (en)2014-06-112019-03-05Optimum Id LlcMethods and systems for providing online verification and security
US9467377B2 (en)2014-06-192016-10-11Palo Alto Research Center IncorporatedAssociating consumer states with interests in a content-centric network
US9537719B2 (en)2014-06-192017-01-03Palo Alto Research Center IncorporatedMethod and apparatus for deploying a minimal-cost CCN topology
US9516144B2 (en)2014-06-192016-12-06Palo Alto Research Center IncorporatedCut-through forwarding of CCNx message fragments with IP encapsulation
US9805201B2 (en)*2014-06-232017-10-31Google Inc.Trust agents
US10148692B2 (en)*2014-06-232018-12-04Google LlcAggregation of asynchronous trust outcomes in a mobile device
US20150373051A1 (en)*2014-06-242015-12-24Google Inc.Dynamic authentication using distributed mobile sensors
US9813410B2 (en)*2014-06-262017-11-07Rakuten, Inc.Information processing apparatus, information processing method, and information processing program
US10546122B2 (en)2014-06-272020-01-28Endera Systems, LlcRadial data visualization system
US9426113B2 (en)2014-06-302016-08-23Palo Alto Research Center IncorporatedSystem and method for managing devices over a content centric network
US9699198B2 (en)2014-07-072017-07-04Cisco Technology, Inc.System and method for parallel secure content bootstrapping in content-centric networks
US9621354B2 (en)2014-07-172017-04-11Cisco Systems, Inc.Reconstructable content objects
US9959156B2 (en)2014-07-172018-05-01Cisco Technology, Inc.Interest return control message
US9729616B2 (en)2014-07-182017-08-08Cisco Technology, Inc.Reputation-based strategy for forwarding and responding to interests over a content centric network
US9590887B2 (en)2014-07-182017-03-07Cisco Systems, Inc.Method and system for keeping interest alive in a content centric network
US9535968B2 (en)2014-07-212017-01-03Palo Alto Research Center IncorporatedSystem for distributing nameless objects using self-certifying names
US9341632B1 (en)*2014-07-232016-05-17Invoy Technologies, Inc.Ketone measurement system capable of detecting correlations between measurements and user behaviors
US9875347B2 (en)2014-07-312018-01-23Nok Nok Labs, Inc.System and method for performing authentication using data analytics
US10148630B2 (en)2014-07-312018-12-04Nok Nok Labs, Inc.System and method for implementing a hosted authentication service
US9749131B2 (en)2014-07-312017-08-29Nok Nok Labs, Inc.System and method for implementing a one-time-password using asymmetric cryptography
US9882964B2 (en)2014-08-082018-01-30Cisco Technology, Inc.Explicit strategy feedback in name-based forwarding
US9444825B2 (en)*2014-08-112016-09-13Empire Technology Development LlcContinuous user authentication
US9503365B2 (en)2014-08-112016-11-22Palo Alto Research Center IncorporatedReputation-based instruction processing over an information centric network
US9729662B2 (en)2014-08-112017-08-08Cisco Technology, Inc.Probabilistic lazy-forwarding technique without validation in a content centric network
US10032011B2 (en)*2014-08-122018-07-24At&T Intellectual Property I, L.P.Method and device for managing authentication using an identity avatar
US9391777B2 (en)2014-08-152016-07-12Palo Alto Research Center IncorporatedSystem and method for performing key resolution over a content centric network
US10187799B2 (en)2014-08-192019-01-22Zighra Inc.System and method for implicit authentication
US9467492B2 (en)2014-08-192016-10-11Palo Alto Research Center IncorporatedSystem and method for reconstructable all-in-one content stream
US9800637B2 (en)2014-08-192017-10-24Cisco Technology, Inc.System and method for all-in-one content stream in content-centric networks
US10362136B2 (en)2014-08-202019-07-23Visa International Service AssociationDevice profile data usage for state management in mobile device authentication
GB2529632A (en)*2014-08-262016-03-02IbmAuthentication management
US9497282B2 (en)2014-08-272016-11-15Palo Alto Research Center IncorporatedNetwork coding for content-centric network
US10698995B2 (en)*2014-08-282020-06-30Facetec, Inc.Method to verify identity using a previously collected biometric image/data
GB2529838B (en)2014-09-032021-06-30Advanced Risc Mach LtdBootstrap Mechanism For Endpoint Devices
US10204013B2 (en)2014-09-032019-02-12Cisco Technology, Inc.System and method for maintaining a distributed and fault-tolerant state over an information centric network
GB2530028B8 (en)2014-09-082021-08-04Advanced Risc Mach LtdRegistry apparatus, agent device, application providing apparatus and corresponding methods
EP3192252A4 (en)*2014-09-082018-05-02Edifire LLCMethods and systems for multi-factor authentication in secure media-based conferencing
US9553812B2 (en)2014-09-092017-01-24Palo Alto Research Center IncorporatedInterest keep alives at intermediate routers in a CCN
US9736154B2 (en)2014-09-162017-08-15Nok Nok Labs, Inc.System and method for integrating an authentication service within a network architecture
US9716716B2 (en)2014-09-172017-07-25Microsoft Technology Licensing, LlcEstablishing trust between two devices
US9131112B1 (en)2014-09-292015-09-08Edifire LLCDynamic signaling and resource allocation in secure media-based conferencing
US9282130B1 (en)2014-09-292016-03-08Edifire LLCDynamic media negotiation in secure media-based conferencing
US10091174B2 (en)2014-09-292018-10-02Dropbox, Inc.Identifying related user accounts based on authentication data
US9167098B1 (en)2014-09-292015-10-20Edifire LLCDynamic conference session re-routing in secure media-based conferencing
US9137187B1 (en)2014-09-292015-09-15Edifire LLCDynamic conference session state management in secure media-based conferencing
US9430696B2 (en)*2014-10-092016-08-30Sensory, IncorporatedContinuous enrollment for face verification
US10229272B2 (en)2014-10-132019-03-12Microsoft Technology Licensing, LlcIdentifying security boundaries on computing devices
US10069933B2 (en)2014-10-232018-09-04Cisco Technology, Inc.System and method for creating virtual interfaces based on network characteristics
US10169556B2 (en)*2014-10-302019-01-01Intuit Inc.Verifying a user's identity based on adaptive identity assurance levels
US9692752B2 (en)*2014-11-172017-06-27Bank Of America CorporationEnsuring information security using one-time tokens
US11134340B2 (en)*2014-11-182021-09-28Intel CorporationAuthentication through tissue-conducted sound
US11328797B2 (en)2014-11-192022-05-10Imprivata, Inc.Location-based healthcare collaboration, data management and access control
US9875468B2 (en)*2014-11-262018-01-23Buy It Mobility Networks Inc.Intelligent authentication process
US20160162900A1 (en)2014-12-092016-06-09Zighra Inc.Fraud detection system, method, and device
US9590948B2 (en)2014-12-152017-03-07Cisco Systems, Inc.CCN routing using hardware-assisted hash tables
US9536059B2 (en)2014-12-152017-01-03Palo Alto Research Center IncorporatedMethod and system for verifying renamed content using manifests in a content centric network
US10237189B2 (en)2014-12-162019-03-19Cisco Technology, Inc.System and method for distance-based interest forwarding
US9846881B2 (en)2014-12-192017-12-19Palo Alto Research Center IncorporatedFrugal user engagement help systems
US9473475B2 (en)2014-12-222016-10-18Palo Alto Research Center IncorporatedLow-cost authenticated signing delegation in content centric networking
US10003520B2 (en)2014-12-222018-06-19Cisco Technology, Inc.System and method for efficient name-based content routing using link-state information in information-centric networks
US9600670B2 (en)*2014-12-232017-03-21Intel CorporationProvisioning location-based security policy
US9660825B2 (en)2014-12-242017-05-23Cisco Technology, Inc.System and method for multi-source multicasting in content-centric networks
FR3031217B1 (en)2014-12-302018-02-09Oberthur Technologies METHOD FOR VERIFYING A PAYMENT REQUEST INCLUDING DETERMINING THE LOCATION OF THE PROVISION OF A PAYMENT TOKEN
US10541986B2 (en)2014-12-312020-01-21Onespan North America Inc.Method and apparatus for securing an application using a measurement of a location dependent physical property of the environment
US9916457B2 (en)2015-01-122018-03-13Cisco Technology, Inc.Decoupled name security binding for CCN objects
US9946743B2 (en)2015-01-122018-04-17Cisco Technology, Inc.Order encoded manifests in a content centric network
US9602596B2 (en)2015-01-122017-03-21Cisco Systems, Inc.Peer-to-peer sharing in a content centric network
US9832291B2 (en)2015-01-122017-11-28Cisco Technology, Inc.Auto-configurable transport stack
US9954795B2 (en)2015-01-122018-04-24Cisco Technology, Inc.Resource allocation using CCN manifests
US9525694B2 (en)*2015-01-152016-12-20Bank Of America CorporationAuthenticating customers and managing authenticated sessions
US9491170B2 (en)2015-01-152016-11-08Bank Of America CorporationAuthenticating customers and managing authenticated sessions
WO2016115633A1 (en)*2015-01-212016-07-28FusionPipe Software Solutions Inc.Enhanced security authentication methods, systems and media
US9462006B2 (en)2015-01-212016-10-04Palo Alto Research Center IncorporatedNetwork-layer application-specific trust model
KR102277212B1 (en)*2015-01-232021-07-15삼성전자주식회사Apparatus and method for iris recognition using display information
US9552493B2 (en)2015-02-032017-01-24Palo Alto Research Center IncorporatedAccess control framework for information centric networking
US9619636B2 (en)*2015-02-062017-04-11Qualcomm IncorporatedApparatuses and methods for secure display on secondary display device
US10333840B2 (en)2015-02-062019-06-25Cisco Technology, Inc.System and method for on-demand content exchange with adaptive naming in information-centric networks
US9407754B1 (en)2015-02-132016-08-02Qualcomm IncorporatedMulti-granular authentication techniques
CA2976463C (en)*2015-02-142024-01-16Valimail Inc.Secure and delegated distribution of private keys via domain name service
WO2016133540A1 (en)2015-02-202016-08-25Hewlett-Packard Development Company, L.P.Eye gaze authentication
US10554676B2 (en)2015-03-032020-02-04Zighra Inc.System and method for behavioural biometric authentication using program modelling
US10075401B2 (en)2015-03-182018-09-11Cisco Technology, Inc.Pending interest table behavior
US10621431B2 (en)*2015-03-272020-04-14Lenovo (Singapore) Pte. Ltd.Camera that uses light from plural light sources disposed on a device
US9613198B2 (en)*2015-03-302017-04-04Honeywell International Inc.Apparatus and method for intelligent video surveillance of industrial console operations
US10431106B1 (en)2015-04-132019-10-01Aptima, Inc.Systems and methods to measure performance
EP3284016B1 (en)*2015-04-162023-11-22Tobii ABAuthentication of a user of a device
US10733587B2 (en)2015-04-302020-08-04Google LlcIdentifying consumers via facial recognition to provide services
US9619803B2 (en)2015-04-302017-04-11Google Inc.Identifying consumers in a transaction via facial recognition
US10397220B2 (en)2015-04-302019-08-27Google LlcFacial profile password to modify user account data for hands-free transactions
CN106200891B (en)2015-05-082019-09-06阿里巴巴集团控股有限公司Show the method, apparatus and system of user interface
EP3298723A4 (en)*2015-05-212019-01-09Ent. Services Development Corporation LP CONTRACT TOKEN CONTAINING DETECTION DATA
US9613199B2 (en)2015-05-272017-04-04Daon Holdings LimitedMethods and systems for ensuring that an individual is authorized to conduct an activity
US10318154B2 (en)*2015-05-312019-06-11Apple Inc.Dynamic group membership for devices
EP3107052A1 (en)*2015-06-152016-12-21Tata Consultancy Services LimitedMethod and system for performing secure banking transactions
US10116605B2 (en)2015-06-222018-10-30Cisco Technology, Inc.Transport stack name scheme and identity management
US10075402B2 (en)2015-06-242018-09-11Cisco Technology, Inc.Flexible command and control in content centric networks
US9749864B2 (en)*2015-06-252017-08-29International Business Machines CorporationControlling mobile device access with a paired device
US10021123B2 (en)*2015-06-292018-07-10Qualcomm IncorporatedCustomized network traffic models to detect application anomalies
US10757104B1 (en)2015-06-292020-08-25Veritas Technologies LlcSystem and method for authentication in a computing system
KR102133534B1 (en)*2015-07-012020-07-13삼성전자주식회사Method and Apparatus for User Authentication
US20170004507A1 (en)*2015-07-022017-01-05Google Inc.Identifying consumers in a transaction via facial recognition
US10509476B2 (en)*2015-07-022019-12-17Verizon Patent And Licensing Inc.Enhanced device authentication using magnetic declination
US10701038B2 (en)2015-07-272020-06-30Cisco Technology, Inc.Content negotiation in a content centric network
US9986034B2 (en)2015-08-032018-05-29Cisco Technology, Inc.Transferring state in content centric network stacks
GB2540989B (en)2015-08-032018-05-30Advanced Risc Mach LtdServer initiated remote device registration
GB2540987B (en)2015-08-032020-05-13Advanced Risc Mach LtdBootstrapping without transferring private key
EP3350748B1 (en)2015-08-172023-07-12Verie, LLCSystems for providing online monitoring of released criminals by law enforcement
US10610144B2 (en)2015-08-192020-04-07Palo Alto Research Center IncorporatedInteractive remote patient monitoring and condition management intervention system
JP2018528538A (en)*2015-08-202018-09-27アヴェロン ユーエス、インコーポレイテッド Electronic security management method and apparatus based on geographical location
JP5951094B1 (en)*2015-09-072016-07-13ヤフー株式会社 Generation device, terminal device, generation method, generation program, and authentication processing system
US10135801B2 (en)*2015-09-092018-11-20Oath Inc.On-line account recovery
JP6122924B2 (en)2015-09-112017-04-26ヤフー株式会社 Providing device, terminal device, providing method, providing program, and authentication processing system
US9832123B2 (en)2015-09-112017-11-28Cisco Technology, Inc.Network named fragments in a content centric network
GB201516617D0 (en)*2015-09-182015-11-04Mastercard International IncVerification for payment transations
US10355999B2 (en)2015-09-232019-07-16Cisco Technology, Inc.Flow control with network named fragments
US9977809B2 (en)2015-09-242018-05-22Cisco Technology, Inc.Information and data framework in a content centric network
US10313227B2 (en)2015-09-242019-06-04Cisco Technology, Inc.System and method for eliminating undetected interest looping in information-centric networks
US10049272B2 (en)2015-09-242018-08-14Microsoft Technology Licensing, LlcUser authentication using multiple capture techniques
US9826083B2 (en)2015-09-292017-11-21Google Inc.Automatic delegation control for device sharing
US10454820B2 (en)2015-09-292019-10-22Cisco Technology, Inc.System and method for stateless information-centric networking
GB201518339D0 (en)2015-10-162015-12-02IbmMobile device location proofing
US10263965B2 (en)2015-10-162019-04-16Cisco Technology, Inc.Encrypted CCNx
FR3042893B1 (en)*2015-10-272017-11-03Morpho METHOD OF DETECTING FRAUD BY PRE-RECORDED IMAGE PROJECTION
US9794238B2 (en)2015-10-292017-10-17Cisco Technology, Inc.System for key exchange in a content centric network
US9641539B1 (en)2015-10-302017-05-02Bank Of America CorporationPassive based security escalation to shut off of application based on rules event triggering
US9820148B2 (en)2015-10-302017-11-14Bank Of America CorporationPermanently affixed un-decryptable identifier associated with mobile device
US9729536B2 (en)2015-10-302017-08-08Bank Of America CorporationTiered identification federated authentication network system
US10021565B2 (en)2015-10-302018-07-10Bank Of America CorporationIntegrated full and partial shutdown application programming interface
US10009446B2 (en)2015-11-022018-06-26Cisco Technology, Inc.Header compression for CCN messages using dictionary learning
US9807205B2 (en)2015-11-022017-10-31Cisco Technology, Inc.Header compression for CCN messages using dictionary
US10021222B2 (en)2015-11-042018-07-10Cisco Technology, Inc.Bit-aligned header compression for CCN messages using dictionary
US10097521B2 (en)2015-11-202018-10-09Cisco Technology, Inc.Transparent encryption in a content centric network
CN107016270A (en)*2015-12-012017-08-04由田新技股份有限公司Dynamic graphic eye movement authentication system and method combining face authentication or hand authentication
US9912776B2 (en)2015-12-022018-03-06Cisco Technology, Inc.Explicit content deletion commands in a content centric network
US10097346B2 (en)2015-12-092018-10-09Cisco Technology, Inc.Key catalogs in a content centric network
EP3179432A1 (en)*2015-12-112017-06-14Mastercard International IncorporatedDelegation of transactions
EP3179431A1 (en)*2015-12-112017-06-14Mastercard International IncorporatedUser authentication for transactions
US11113687B2 (en)2015-12-152021-09-07Mastercard International IncorporatedSystem for performing cross card authentication using wallet transaction authentication history
US10078062B2 (en)2015-12-152018-09-18Palo Alto Research Center IncorporatedDevice health estimation by combining contextual information with sensor data
US10291610B2 (en)2015-12-152019-05-14Visa International Service AssociationSystem and method for biometric authentication using social network
US9781095B2 (en)*2015-12-182017-10-03International Business Machines CorporationSuppression of authorization risk feedback to mitigate risk factor manipulation in an authorization system
US10102358B2 (en)*2015-12-292018-10-16Sensory, IncorporatedFace-controlled liveness verification
US10817593B1 (en)*2015-12-292020-10-27Wells Fargo Bank, N.A.User information gathering and distribution system
US10778435B1 (en)*2015-12-302020-09-15Jpmorgan Chase Bank, N.A.Systems and methods for enhanced mobile device authentication
CN106940766A (en)*2016-01-042017-07-11由田新技股份有限公司Sight line track authentication system and method
EP3400552B1 (en)*2016-01-082021-03-03Visa International Service AssociationSecure authentication using biometric input
US10257271B2 (en)2016-01-112019-04-09Cisco Technology, Inc.Chandra-Toueg consensus in a content centric network
US10007771B2 (en)2016-01-152018-06-26Qualcomm IncorporatedUser interface for a mobile device
US10481786B2 (en)2016-01-152019-11-19Qualcomm IncorporatedUser interface for enabling access to data of a mobile device
US9949301B2 (en)2016-01-202018-04-17Palo Alto Research Center IncorporatedMethods for fast, secure and privacy-friendly internet connection discovery in wireless networks
US10305864B2 (en)2016-01-252019-05-28Cisco Technology, Inc.Method and system for interest encryption in a content centric network
US11107071B2 (en)*2016-02-012021-08-31Apple Inc.Validating online access to secure device functionality
US10043016B2 (en)2016-02-292018-08-07Cisco Technology, Inc.Method and system for name encryption agreement in a content centric network
US10237259B2 (en)*2016-02-292019-03-19Securekey Technologies Inc.Systems and methods for distributed identity verification
EP3424176B1 (en)*2016-02-292021-10-13SecureKey Technologies Inc.Systems and methods for distributed data sharing with asynchronous third-party attestation
KR102148443B1 (en)*2016-03-012020-10-14구글 엘엘씨 Face template and token pre-fetch in hands-free service request
US10003507B2 (en)2016-03-042018-06-19Cisco Technology, Inc.Transport session state protocol
US10051071B2 (en)2016-03-042018-08-14Cisco Technology, Inc.Method and system for collecting historical network information in a content centric network
US10038633B2 (en)2016-03-042018-07-31Cisco Technology, Inc.Protocol to query for historical network information in a content centric network
US10742596B2 (en)2016-03-042020-08-11Cisco Technology, Inc.Method and system for reducing a collision probability of hash-based names using a publisher identifier
WO2017152956A1 (en)*2016-03-082017-09-14Izettle Merchant Services AbUser identity evaluation
US9832116B2 (en)2016-03-142017-11-28Cisco Technology, Inc.Adjusting entries in a forwarding information base in a content centric network
US10572961B2 (en)2016-03-152020-02-25Global Tel*Link CorporationDetection and prevention of inmate to inmate message relay
US10516654B2 (en)*2016-03-152019-12-24Intel CorporationSystem, apparatus and method for key provisioning delegation
US10212196B2 (en)2016-03-162019-02-19Cisco Technology, Inc.Interface discovery and authentication in a name-based network
US10067948B2 (en)2016-03-182018-09-04Cisco Technology, Inc.Data deduping in content centric networking manifests
US11436656B2 (en)2016-03-182022-09-06Palo Alto Research Center IncorporatedSystem and method for a real-time egocentric collaborative filter on large datasets
US10229285B2 (en)2016-03-222019-03-12International Business Machines CorporationPrivacy enhanced central data storage
US10091330B2 (en)2016-03-232018-10-02Cisco Technology, Inc.Interest scheduling by an information and data framework in a content centric network
US10033639B2 (en)2016-03-252018-07-24Cisco Technology, Inc.System and method for routing packets in a content centric network using anonymous datagrams
US20170288866A1 (en)*2016-03-302017-10-05AVAST Software s.r.o.Systems and methods of creating a distributed ring of trust
US10063562B1 (en)*2016-03-312018-08-28EMC IP Holding Company LLCFlexible access management framework based on measuring application usage behavior
US10320760B2 (en)2016-04-012019-06-11Cisco Technology, Inc.Method and system for mutating and caching content in a content centric network
US9930146B2 (en)2016-04-042018-03-27Cisco Technology, Inc.System and method for compressing content centric networking messages
US10425503B2 (en)2016-04-072019-09-24Cisco Technology, Inc.Shared pending interest table in a content centric network
US9609121B1 (en)2016-04-072017-03-28Global Tel*Link CorporationSystem and method for third party monitoring of voice and video calls
US10027578B2 (en)2016-04-112018-07-17Cisco Technology, Inc.Method and system for routable prefix queries in a content centric network
AU2016402395A1 (en)*2016-04-122018-08-23Sensoriant, Inc.Method and system for safeguarding stored data
US9596079B1 (en)*2016-04-142017-03-14Wickr Inc.Secure telecommunications
US10366405B2 (en)*2016-04-152019-07-30Flipboard, Inc.Content viewability based on user interaction in a flip-based digital magazine environment
US11170358B2 (en)*2016-04-292021-11-09International Business Machines CorporationSystem, method, and recording medium for identity fraud prevention in secure transactions using multi-factor verification
US10328204B2 (en)2016-05-022019-06-25Dexcom, Inc.System and method for providing alerts optimized for a user
US10404450B2 (en)2016-05-022019-09-03Cisco Technology, Inc.Schematized access control in a content centric network
US10320675B2 (en)2016-05-042019-06-11Cisco Technology, Inc.System and method for routing packets in a stateless content centric network
US10547589B2 (en)2016-05-092020-01-28Cisco Technology, Inc.System for implementing a small computer systems interface protocol over a content centric network
EP3455766A4 (en)2016-05-102019-11-27National ICT Australia Limited AUTHENTICATION OF A USER
US10063414B2 (en)2016-05-132018-08-28Cisco Technology, Inc.Updating a transport stack in a content centric network
US10084764B2 (en)2016-05-132018-09-25Cisco Technology, Inc.System for a secure encryption proxy in a content centric network
US10469653B2 (en)2016-05-152019-11-05Fmr LlcProximity and movement detection of a mobile computing device during a user session
US9686644B1 (en)2016-05-152017-06-20Fmr LlcGeospatial-based detection of mobile computing device movement
US9883403B2 (en)2016-05-152018-01-30Fmr LlcMonitoring presence of authorized user during user session based upon mobile computing device motion
WO2017205543A1 (en)*2016-05-242017-11-30Brown Timothy JLiveness detection for face capture
US10453060B2 (en)2016-05-272019-10-22Mastercard International IncorporatedSystems and methods for authenticating a requestor at an ATM
US9801066B1 (en)2016-06-022017-10-24Duo Security, Inc.Method for automatic possession-factor authentication
US10103989B2 (en)2016-06-132018-10-16Cisco Technology, Inc.Content object return messages in a content centric network
US10185817B2 (en)2016-06-162019-01-22International Business Machines CorporationDevice security via swipe pattern recognition
US10305865B2 (en)2016-06-212019-05-28Cisco Technology, Inc.Permutation-based content encryption with manifests in a content centric network
JP2018005271A (en)*2016-06-272018-01-11株式会社東芝Server, ic card processor and ic card processing system
US10148572B2 (en)2016-06-272018-12-04Cisco Technology, Inc.Method and system for interest groups in a content centric network
US20170372310A1 (en)*2016-06-272017-12-28Paypal, Inc.Secure key based trust chain among user devices
SG10201605364XA (en)*2016-06-292018-01-30Mastercard Asia Pacific Pte LtdMethod For Effecting An Authentication Procedure Associated With A Service Provider Or An Application
US10152350B2 (en)*2016-07-012018-12-11Intel CorporationSecure domain manager
US10009266B2 (en)2016-07-052018-06-26Cisco Technology, Inc.Method and system for reference counted pending interest tables in a content centric network
US11132425B1 (en)2016-07-072021-09-28Wells Fargo Bank, N.A.Systems and methods for location-binding authentication
US9992097B2 (en)2016-07-112018-06-05Cisco Technology, Inc.System and method for piggybacking routing information in interests in a content centric network
US10122624B2 (en)2016-07-252018-11-06Cisco Technology, Inc.System and method for ephemeral entries in a forwarding information base in a content centric network
KR102608994B1 (en)*2016-07-282023-12-06삼성전자주식회사Method and electronic device for payment using biometric authentication
US9854398B1 (en)2016-08-032017-12-26International Business Machines CorporationSystem, method and recording medium for location verification
WO2018027148A1 (en)*2016-08-052018-02-08Nok Nok Labs, Inc.Authentication techniques including speech and/or lip movement analysis
US10769635B2 (en)*2016-08-052020-09-08Nok Nok Labs, Inc.Authentication techniques including speech and/or lip movement analysis
US10637853B2 (en)2016-08-052020-04-28Nok Nok Labs, Inc.Authentication techniques including speech and/or lip movement analysis
US10069729B2 (en)2016-08-082018-09-04Cisco Technology, Inc.System and method for throttling traffic based on a forwarding information base in a content centric network
US10956412B2 (en)2016-08-092021-03-23Cisco Technology, Inc.Method and system for conjunctive normal form attribute matching in a content centric network
GB201613882D0 (en)*2016-08-122016-09-28Mastercard International IncDigital secure remote payment(DSRP) Enhancements when transacting with an authenticated merchant
CN106899567B (en)*2016-08-242019-12-13阿里巴巴集团控股有限公司 User authentication method, device and system
US9980135B2 (en)*2016-09-122018-05-22Qualcomm IncorporatedManaging security for a mobile communication device
US10033642B2 (en)2016-09-192018-07-24Cisco Technology, Inc.System and method for making optimal routing decisions based on device-specific parameters in a content centric network
US11010763B1 (en)*2016-09-272021-05-18United Services Automobile Association (Usaa)Biometric authentication on push notification
US10212248B2 (en)2016-10-032019-02-19Cisco Technology, Inc.Cache management on high availability routers in a content centric network
US10447805B2 (en)2016-10-102019-10-15Cisco Technology, Inc.Distributed consensus in a content centric network
EP3312751B1 (en)2016-10-182020-10-07Tata Consultancy Services LimitedSystems and methods for generating multi-dimensional password and authenticating thereof
US11062304B2 (en)2016-10-202021-07-13Google LlcOffline user identification
US10284538B2 (en)2016-10-262019-05-07Bank Of America CorporationSystem for processing an even request by determining a matching user profile based on user identifying information
US10135948B2 (en)2016-10-312018-11-20Cisco Technology, Inc.System and method for process migration in a content centric network
US10243851B2 (en)2016-11-212019-03-26Cisco Technology, Inc.System and method for forwarder connection information in a content centric network
KR20180074152A (en)*2016-12-232018-07-03삼성전자주식회사Security enhanced speech recognition method and apparatus
US10532719B2 (en)*2016-12-302020-01-14Robert Bosch GmbhBluetooth low energy (BLE) passive vehicle access control system for defending the system against relay attacks and method thereof
US10091195B2 (en)2016-12-312018-10-02Nok Nok Labs, Inc.System and method for bootstrapping a user binding
US10237070B2 (en)2016-12-312019-03-19Nok Nok Labs, Inc.System and method for sharing keys across authenticators
US10313357B2 (en)2017-01-132019-06-04Microsoft Technology Licensing, LlcReduced user authentication input requirements
US10375083B2 (en)*2017-01-252019-08-06International Business Machines CorporationSystem, method and computer program product for location verification
US10375457B2 (en)2017-02-022019-08-06International Business Machines CorporationInterpretation of supplemental sensors
CN108418776B (en)*2017-02-092021-08-20上海诺基亚贝尔股份有限公司Method and apparatus for providing secure services
US11310224B2 (en)2017-02-152022-04-19Adp, Inc.Enhanced security authentication system
GB2560340A (en)2017-03-072018-09-12Eyn LtdVerification method and system
US11593773B1 (en)*2017-03-312023-02-28Block, Inc.Payment transaction authentication system and method
US10412096B2 (en)*2017-04-182019-09-10Visa International Service AssociationWireless authentication based on location data
KR102458805B1 (en)2017-04-202022-10-25구글 엘엘씨Multi-user authentication on a device
US10623402B2 (en)*2017-04-202020-04-14Adp, LlcEnhanced security authentication system
US10657607B2 (en)2017-05-062020-05-19Adp, LlcImplementation of payroll smart contract on a distributed ledger
US10027797B1 (en)2017-05-102018-07-17Global Tel*Link CorporationAlarm control for inmate call monitoring
US10645079B2 (en)*2017-05-122020-05-05Bank Of America CorporationPreventing unauthorized access to secured information systems using authentication tokens and multi-device authentication prompts
US10574650B2 (en)*2017-05-172020-02-25Bank Of America CorporationSystem for electronic authentication with live user determination
US10225396B2 (en)2017-05-182019-03-05Global Tel*Link CorporationThird party monitoring of a activity within a monitoring platform
US10579322B1 (en)2017-05-222020-03-03Parallels International GmbhConnecting to remote access session based on proximity of mobile device
CN110998626B (en)2017-05-312023-12-01谷歌有限责任公司 Provide hands-free data for interaction
US10860786B2 (en)2017-06-012020-12-08Global Tel*Link CorporationSystem and method for analyzing and investigating communication data from a controlled environment
US11063748B2 (en)*2017-06-042021-07-13Apple Inc.Synchronizing content
US11182349B2 (en)2017-06-042021-11-23Apple Inc.Synchronizing content
US10657401B2 (en)*2017-06-062020-05-19Microsoft Technology Licensing, LlcBiometric object spoof detection based on image intensity variations
US10574662B2 (en)2017-06-202020-02-25Bank Of America CorporationSystem for authentication of a user based on multi-factor passively acquired data
US10360733B2 (en)2017-06-202019-07-23Bank Of America CorporationSystem controlled augmented resource facility
US10754939B2 (en)2017-06-262020-08-25International Business Machines CorporationSystem and method for continuous authentication using augmented reality and three dimensional object recognition
US11303631B1 (en)*2017-06-302022-04-12Wells Fargo Bank, N.A.Authentication as a service
US10803014B2 (en)*2017-07-282020-10-13Adp, LlcDynamic data relationships in a graph database
WO2019051617A1 (en)*2017-09-182019-03-21Glance Pay Inc.Systems and methods for online payments
US10346841B2 (en)*2017-10-162019-07-09Capital One Services, LlcTransaction card security device
EP3586552B1 (en)*2017-11-062022-03-30Google LLCEvaluating ip location accuracy on a mobile device
US10269017B1 (en)*2017-11-212019-04-23Capital One Services, LlcTransaction confirmation and authentication based on device sensor data
US11868995B2 (en)2017-11-272024-01-09Nok Nok Labs, Inc.Extending a secure key storage for transaction confirmation and cryptocurrency
CN108428135A (en)*2017-11-282018-08-21深圳萨摩耶互联网金融服务有限公司Auth method
US10652743B2 (en)2017-12-212020-05-12The Chamberlain Group, Inc.Security system for a moveable barrier operator
US11831409B2 (en)*2018-01-122023-11-28Nok Nok Labs, Inc.System and method for binding verifiable claims
US11562362B1 (en)2018-01-232023-01-24Wells Fargo Bank, N.A.Systems and methods for a virtual identity card
CN111919212A (en)*2018-01-302020-11-10维萨国际服务协会 System and method for biometric fallback authentication
US10587623B2 (en)2018-01-312020-03-10T-Mobile Usa, Inc.Mobile device platform for access privilege control system
US10924480B2 (en)*2018-02-282021-02-16Cisco Technology, Inc.Extended trust for onboarding
WO2019171163A1 (en)*2018-03-072019-09-12Visa International Service AssociationSecure remote token release with online authentication
GB201803815D0 (en)2018-03-092018-04-25Nchain Holdings LtdComputer-implemented methods and systems
EP3561753A1 (en)*2018-04-252019-10-30CCV Deutschland GmbHData transmission and processing method and assembly for same
US11985132B2 (en)*2018-05-022024-05-14Samsung Electronics Co., Ltd.System and method for resource access authentication
CN108875327A (en)2018-05-282018-11-23阿里巴巴集团控股有限公司One seed nucleus body method and apparatus
US11093772B2 (en)*2018-06-112021-08-17Laurence HamidLiveness detection
US11074773B1 (en)2018-06-272021-07-27The Chamberlain Group, Inc.Network-based control of movable barrier operators for autonomous vehicles
US11093599B2 (en)*2018-06-282021-08-17International Business Machines CorporationTamper mitigation scheme for locally powered smart devices
CN108875688B (en)2018-06-282022-06-10北京旷视科技有限公司Living body detection method, device, system and storage medium
EP3592055B1 (en)*2018-07-032022-03-23Sony Network Communications Europe B.V.Methods for securely validating localization of a wireless communication device, and related devices
US11080375B2 (en)2018-08-012021-08-03Intuit Inc.Policy based adaptive identity proofing
US11423717B2 (en)2018-08-012022-08-23The Chamberlain Group LlcMovable barrier operator and transmitter pairing over a network
CN109065058B (en)*2018-09-302024-03-15合肥鑫晟光电科技有限公司 Voice communication method, device and system
US11368446B2 (en)*2018-10-022022-06-21International Business Machines CorporationTrusted account revocation in federated identity management
US11822637B2 (en)*2018-10-182023-11-21Oracle International CorporationAdaptive authentication in spreadsheet interface integrated with web service
US11882438B2 (en)*2018-10-292024-01-23Zorday IP, LLCNetwork-enabled electronic cigarette
US10827452B2 (en)2018-11-202020-11-03Here Global B.V.Trustworthiness of location estimates
EP3661148B1 (en)*2018-11-282023-05-24Nxp B.V.Location- and identity-referenced authentication method and communication system
GB2579571B (en)2018-12-032021-05-12Advanced Risc Mach LtdDevice bootstrapping
GB2579574B (en)2018-12-032021-08-11Advanced Risc Mach LtdBootstrapping with common credential data
WO2020117224A1 (en)*2018-12-052020-06-11Hewlett-Packard Development Company, L.P.Contextual biometric logging systems
US11641363B2 (en)*2019-01-142023-05-02Qatar Foundation For Education, Science And Community DevelopmentMethods and systems for verifying the authenticity of a remote service
KR102758937B1 (en)*2019-02-182025-01-23삼성전자주식회사Electronic device for authenticating biometric information and operating method thereof
JP2022059099A (en)*2019-02-252022-04-13ソニーグループ株式会社 Information processing equipment, information processing methods, and programs
US12041039B2 (en)2019-02-282024-07-16Nok Nok Labs, Inc.System and method for endorsing a new authenticator
US20200311230A1 (en)*2019-03-272020-10-01Google LlcSystem and Method for Obtaining Authentication Credentials from Users
EP3931725A4 (en)*2019-03-292022-11-16Citrix Systems, Inc.Techniques involving a security heat map
US11792024B2 (en)2019-03-292023-10-17Nok Nok Labs, Inc.System and method for efficient challenge-response authentication
US11475134B2 (en)2019-04-102022-10-18Arm LimitedBootstrapping a device
US10997810B2 (en)2019-05-162021-05-04The Chamberlain Group, Inc.In-vehicle transmitter training
US11876798B2 (en)*2019-05-202024-01-16Citrix Systems, Inc.Virtual delivery appliance and system with remote authentication and related methods
US10878650B1 (en)2019-06-122020-12-29Honeywell International Inc.Access control system using mobile device
US11601284B2 (en)*2019-06-142023-03-07Planetway CorporationDigital signature system based on a cloud of dedicated local devices
CN112148119B (en)*2019-06-262024-08-09托比股份公司Method, eye tracker and computer program for determining eye position in digital image data
US11545131B2 (en)2019-07-162023-01-03Microsoft Technology Licensing, LlcReading order system for improving accessibility of electronic content
SG10201906806XA (en)*2019-07-232021-02-25Mastercard International IncMethods and computing devices for auto-submission of user authentication credential
EP3786767B1 (en)*2019-07-292023-11-08HTC CorporationEye tracking method, head-mounted display, and computer readable storage medium
US11096059B1 (en)*2019-08-042021-08-17Acceptto CorporationSystem and method for secure touchless authentication of user paired device, behavior and identity
EP3772699A1 (en)*2019-08-092021-02-10Siemens AktiengesellschaftMethod for user verification, communication device and computer program
US11509642B2 (en)*2019-08-212022-11-22Truist BankLocation-based mobile device authentication
US11062313B2 (en)2019-09-132021-07-13International Business Machines CorporationSmart contract enabled smart contact-based computing
US11432149B1 (en)2019-10-102022-08-30Wells Fargo Bank, N.A.Self-sovereign identification via digital credentials for selected identity attributes
US11820529B2 (en)2019-10-292023-11-21Ga Telesis, LlcSystem and method for monitoring and certifying aircrafts and components of aircrafts
US11528267B2 (en)*2019-12-062022-12-13Bank Of America CorporationSystem for automated image authentication and external database verification
US11575670B2 (en)2019-12-092023-02-07Accenture Global Solutions LimitedAdaptive user authentication
US11523282B2 (en)*2020-02-052022-12-06Lookout Inc.Use of geolocation to improve security while protecting privacy
WO2021216044A1 (en)*2020-04-212021-10-28Hewlett-Packard Development Company, L.P.Authentication and calibration via gaze tracking
US11677731B2 (en)2020-04-292023-06-13Wells Fargo Bank, N.A.Adaptive authentication
US11611877B2 (en)*2020-07-082023-03-21T-Mobile Usa, Inc.User authentication
AU2021305185A1 (en)*2020-07-082023-03-09Cervais Inc.Peer-to-peer secure communication system, apparatus, and method
US11528269B2 (en)2020-08-052022-12-13Bank Of America CorporationApplication for requesting multi-person authentication
US11792188B2 (en)2020-08-052023-10-17Bank Of America CorporationApplication for confirming multi-person authentication
US11792187B2 (en)2020-08-052023-10-17Bank Of America CorporationMulti-person authentication
US11989317B2 (en)*2020-08-192024-05-21Docusign, Inc.Modifying elements of a secure document workflow based on change in profile of recipient
US12106304B2 (en)*2020-09-022024-10-01Kyndryl, Inc.Transaction authorization
US12093353B2 (en)*2020-09-042024-09-17Shopify Inc.Systems and methods for user authentication
US11627129B2 (en)*2020-10-142023-04-11Citrix Systems, Inc.Method and system for contextual access control
US11457012B2 (en)*2020-11-032022-09-27Okta, Inc.Device risk level based on device metadata comparison
US11749045B2 (en)2021-03-012023-09-05Honeywell International Inc.Building access using a mobile device
GB2604597B (en)*2021-03-052023-04-19British TelecommAuthentication mechanism
US11935055B2 (en)2021-03-222024-03-19Bank Of America CorporationWired multi-factor authentication for ATMs using an authentication media
DE102021112041A1 (en)*2021-05-072022-11-10Embex Gmbh Method for authentication of interactions independent of a system time and device for carrying out this method and flame monitor with a dear-like device
US11978080B2 (en)*2021-05-262024-05-07Yahoo Assets LlcMethod and system for selecting payment option for transaction
US12096221B2 (en)2021-07-082024-09-17Nippon Telegraph And Telephone CorporationDetermination system, determination method, and computer-readable recording medium
US11930000B2 (en)*2021-08-022024-03-12Cisco Technology, Inc.Detection of anomalous authentications
FR3126514B1 (en)*2021-08-252024-09-27Worldline Strong asynchronous authentication method and terminal configured for implementing said method.
US12126613B2 (en)2021-09-172024-10-22Nok Nok Labs, Inc.System and method for pre-registration of FIDO authenticators
US12197877B2 (en)*2021-11-032025-01-14Virginia Tech Intellectual Properties, Inc.Visual language processing modeling framework via an attention-on-attention mechanism
US20230216691A1 (en)*2021-12-302023-07-06Here Global B.V.Method, apparatus, and system for providing transaction proof of location
US12236422B2 (en)*2022-01-052025-02-25Mastercard International IncorporatedComputer-implemented methods and systems for authentic user-merchant association and services
GB202201951D0 (en)*2022-02-152022-03-30Nchain Licensing AgBlockchain transaction
US12107853B2 (en)2022-04-212024-10-01Bank Of America CorporationSystem and method for intelligent authentication via object movement recognition
US12375494B1 (en)*2022-05-232025-07-29Verosint, Inc.Method and system for making identity decisions
US20240195635A1 (en)*2022-12-122024-06-13Intel CorporationRoots of trust in intellectual property (ip) blocks in a system on a chip (soc)
US12309132B1 (en)*2024-07-122025-05-20Cortwo Corp.Continuous universal trust architecture and method

Citations (453)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5272754A (en)1991-03-281993-12-21Secure Computing CorporationSecure computer interface
US5280527A (en)1992-04-141994-01-18Kamahira Safe Co., Inc.Biometric token for authorizing access to a host system
JPH06195307A (en)1992-12-221994-07-15Fujitsu LtdAutomatic registering device for many and unspecified users
JPH09231172A (en)1996-02-261997-09-05Nippon Denki Ido Tsushin KkPassword registering method
US5764789A (en)1994-11-281998-06-09Smarttouch, LlcTokenless biometric ATM access system
US5892900A (en)1996-08-301999-04-06Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US6035406A (en)1997-04-022000-03-07Quintet, Inc.Plurality-factor security system
US6088450A (en)1996-04-172000-07-11Intel CorporationAuthentication system based on periodic challenge/response protocol
US6178511B1 (en)1998-04-302001-01-23International Business Machines CorporationCoordinating user target logons in a single sign-on (SSO) environment
US6270011B1 (en)1998-05-282001-08-07Benenson TalRemote credit card authentication system
US20010037451A1 (en)2000-03-062001-11-01Bhagavatula Ravishankar S.Centralized identity authentication for electronic communication networks
JP2001325469A (en)2000-02-292001-11-22Internatl Business Mach Corp <Ibm>System and method for relating device for securing electronic commercial transaction
US20020010857A1 (en)2000-06-292002-01-24Kaleedhass KarthikBiometric verification for electronic transactions over the web
US20020016913A1 (en)2000-08-042002-02-07Wheeler Lynn HenryModifying message data and generating random number digital signature within computer chip
US20020037736A1 (en)2000-09-282002-03-28Kenji KawaguchiClosed group communication method and communication terminal equipment
US20020040344A1 (en)2000-10-042002-04-04Preiser Randall F.Check guarantee, verification, processing, credit reports and collection system and method awarding purchase points for usage of checks
US6377691B1 (en)1996-12-092002-04-23Microsoft CorporationChallenge-response authentication and key exchange for a connectionless security protocol
US20020054695A1 (en)1998-09-162002-05-09Vance C. BjornConfigurable multi-function touchpad device
JP2002152189A (en)2000-11-142002-05-24Nippon Hoso Kyokai <Nhk> Public key distribution method, public key transmitting device and public key receiving device used in this method
US20020073320A1 (en)2000-12-072002-06-13International Business Machines CorporationAggregated authenticated identity apparatus for and method therefor
US20020073316A1 (en)1998-02-032002-06-13Thomas CollinsCryptographic system enabling ownership of a secure process
US20020082962A1 (en)2000-07-272002-06-27Farris Robert G.Value transfer system for unbanked customers
US20020087894A1 (en)2001-01-032002-07-04Foley James M.Method and apparatus for enabling a user to select an authentication method
US20020112157A1 (en)1997-09-222002-08-15Proofspace, Inc.System and method for widely witnessed proof of time
US20020112170A1 (en)2001-01-032002-08-15Foley James M.Method and apparatus for using one financial instrument to authenticate a user for accessing a second financial instrument
US20020174344A1 (en)*2001-05-182002-11-21Imprivata, Inc.System and method for authentication using biometrics
US20020190124A1 (en)2001-06-152002-12-19Koninklijke Philips Electronics N.V.Point-of-sale (POS) voice authentication transaction system
US6510236B1 (en)1998-12-112003-01-21International Business Machines CorporationAuthentication framework for managing authentication requests from multiple authentication devices
US20030021283A1 (en)*2001-07-302003-01-30See Michael E.Distributed network management system using policies
WO2003017159A1 (en)2001-08-102003-02-27Matsushita Electric Industrial Co., Ltd.Electronic device
US20030055792A1 (en)2001-07-232003-03-20Masaki KinoshitaElectronic payment method, system, and devices
US20030065805A1 (en)2000-06-292003-04-03Barnes Melvin L.System, method, and computer program product for providing location based services and mobile e-commerce
US20030084300A1 (en)2001-10-232003-05-01Nec CorporationSystem for administrating data including privacy of user in communication made between server and user's terminal device
US20030087629A1 (en)2001-09-282003-05-08Bluesocket, Inc.Method and system for managing data traffic in wireless networks
JP2003143136A (en)2001-10-302003-05-16Toshiba Corp Identity verification system and device
US20030115142A1 (en)2001-12-122003-06-19Intel CorporationIdentity authentication portfolio system
US6588812B1 (en)2001-02-222003-07-08The Regents Of The University Of CaliforniaEnhanced tamper indicator
US20030135740A1 (en)2000-09-112003-07-17Eli TalmorBiometric-based system and method for enabling authentication of electronic messages sent over a network
JP2003219473A (en)2002-01-222003-07-31Citizen Watch Co LtdPortable information apparatus, personal authentication system and data managing method
JP2003223235A (en)2001-11-262003-08-08Matsushita Electric Ind Co Ltd Application authentication system
US20030152252A1 (en)2002-02-052003-08-14Kenji KondoPersonal authentication method, personal authentication apparatus and image capturing device
US6618806B1 (en)1998-04-012003-09-09Saflink CorporationSystem and method for authenticating users in a computer network
JP2003274007A (en)2002-03-192003-09-26Nec CorpMobile phone
JP2003318894A (en)2002-02-212003-11-07Matsushita Electric Ind Co Ltd Authentication processing method between devices by challenge-response method
US20030226036A1 (en)2002-05-302003-12-04International Business Machines CorporationMethod and apparatus for single sign-on authentication
US20030236991A1 (en)2002-06-202003-12-25Reed LetsingerAllowing an electronic device accessing a service to be authenticated
EP1376302A2 (en)2002-06-242004-01-02Microsoft CorporationSecure media path methods, systems, and architectures
US20040039909A1 (en)*2002-08-222004-02-26David ChengFlexible authentication with multiple levels and factors
JP2004118456A (en)2002-09-252004-04-15Japan Science & Technology Corp Mobile terminal authentication system using location information
US20040101170A1 (en)2002-11-202004-05-27Christel-Loic TisseEvaluation of the definition of an eye iris image
US6751733B1 (en)1998-09-112004-06-15Mitsubishi Denki Kabushiki KaishaRemote authentication system
US20040123153A1 (en)2002-12-182004-06-24Michael WrightAdministration of protection of data accessible by a mobile device
US6801998B1 (en)1999-11-122004-10-05Sun Microsystems, Inc.Method and apparatus for presenting anonymous group names
JP2004348308A (en)2003-05-212004-12-09Hitachi Ltd Personal authentication system
US6842896B1 (en)*1999-09-032005-01-11Rainbow Technologies, Inc.System and method for selecting a server in a multiple server license management system
US20050021964A1 (en)2003-07-252005-01-27Bhavna BhatnagarMethod and system for providing a circle of trust on a network
JP2005092614A (en)2003-09-182005-04-07Toda Constr Co Ltd Biometric authentication system, program, and information storage medium
US20050080716A1 (en)2003-09-252005-04-14Boris BelyiData validation systems and methods for use in financial transactions
US20050097320A1 (en)2003-09-122005-05-05Lior GolanSystem and method for risk based authentication
US20050100166A1 (en)*2003-11-102005-05-12Parc Inc.Systems and methods for authenticating communications in a network medium
US20050125295A1 (en)2003-12-092005-06-09Tidwell Lisa C.Systems and methods for obtaining payor information at a point of sale
US20050160052A1 (en)2003-11-252005-07-21Schneider John K.Biometric authorization method and system
US20050187883A1 (en)1999-08-312005-08-25American Express Travel Related Services Company, Inc.Methods and apparatus for conducting electronic transactions using biometrics
US20050223236A1 (en)2004-03-302005-10-06Fujitsu LimitedBiometric information verifying apparatus, biometric information narrowing apparatus, and computer-readable recording medium storing a biometric information narrowing program thereon
US20050223217A1 (en)2004-04-012005-10-06Microsoft CorporationAuthentication broker service
JP2005316936A (en)2004-03-312005-11-10Dowango:KkCommodity server, method for paying purchase price, method for purchasing commodity, and computer program
CN1705925A (en)2002-07-032005-12-07富利科技有限公司Biometric private key infrastructure
US20050278253A1 (en)2004-06-152005-12-15Microsoft CorporationVerifying human interaction to a computer entity by way of a trusted component on a computing device or the like
US20060026671A1 (en)2004-08-022006-02-02Darran PotterMethod and apparatus for determining authentication capabilities
US20060029062A1 (en)2004-07-232006-02-09Citrix Systems, Inc.Methods and systems for securing access to private networks using encryption and authentication technology built in to peripheral devices
US20060064582A1 (en)2004-09-132006-03-23Coretrace CorporationMethod and system for license management
US20060101136A1 (en)2004-09-302006-05-11Felica Networks, Inc.Information management apparatus, information management method, and program
JP2006144421A (en)2004-11-222006-06-08Railway Technical Res Inst Authentication system
US20060149580A1 (en)2004-09-172006-07-06David HelsperFraud risk advisor
US20060156385A1 (en)2003-12-302006-07-13Entrust LimitedMethod and apparatus for providing authentication using policy-controlled authentication articles and techniques
US20060161672A1 (en)2004-11-222006-07-20Bea Systems, Inc.System and method for improved interportlet communications
US20060161435A1 (en)2004-12-072006-07-20Farsheed AtefSystem and method for identity verification and management
US20060174037A1 (en)2002-07-292006-08-03Bea Systems, Inc.Identifying a computer device
US20060177061A1 (en)2004-10-252006-08-10Orsini Rick LSecure data parser method and system
US20060195689A1 (en)2005-02-282006-08-31Carsten BleckenAuthenticated and confidential communication between software components executing in un-trusted environments
US20060213978A1 (en)2005-03-252006-09-28Bluko Information GroupMethod and system of advancing value from credit card account for use with stored value account
US20060282670A1 (en)2005-06-082006-12-14International Business Machines CorporationRelying party trust anchor based public key technology framework
TW200701120A (en)2005-06-242007-01-01Alfa Power Co LtdSafe trading system of automatic teller machine (atm) with integration of multimedia information
US20070005988A1 (en)2005-06-292007-01-04Microsoft CorporationMultimodal authentication
US20070038568A1 (en)2004-09-172007-02-15Todd GreeneFraud analyst smart cookie
WO2007023756A1 (en)2005-08-242007-03-01Nec CorporationIdentify authenticating system, user terminal, service provider apparatus, reliability assuring server, operating method of them and operating program of them
US7194761B1 (en)2002-01-222007-03-20Cisco Technology, Inc.Methods and apparatus providing automatic client authentication
US20070077915A1 (en)2005-09-302007-04-05Black Greg RMethod and apparatus for module authentication
US20070087756A1 (en)2005-10-042007-04-19Hoffberg Steven MMultifactorial optimization system and method
US20070088950A1 (en)1998-11-092007-04-19First Data CorporationAccount-based digital signature (abds) system using biometrics
US20070094165A1 (en)2005-10-262007-04-26Motorola, Inc.Path determination facilitation method
US20070101138A1 (en)2005-09-292007-05-03International Business Machines CorporationCryptographic methods, host system, trusted platform module, computer arrangement, computer program product and computer program
US20070100756A1 (en)2005-10-282007-05-03Microsoft CorporationSecure storage
US20070106895A1 (en)2005-11-042007-05-10Kung-Shiuh HuangBiometric non-repudiation network security systems and methods
US20070107048A1 (en)2005-10-112007-05-10David HallsSystems and Methods for Facilitating Distributed Authentication
JP2007148470A (en)2005-11-242007-06-14Hitachi Ltd Processing device, auxiliary information generation device, terminal device, authentication device, and biometric authentication system
US20070165625A1 (en)2005-12-012007-07-19Firestar Software, Inc.System and method for exchanging information among exchange applications
US20070169182A1 (en)2006-01-132007-07-19Wolfond Gregory HMulti-mode credential authorization
US20070168677A1 (en)2005-12-272007-07-19International Business Machines CorporationChanging user authentication method by timer and the user context
US20070198435A1 (en)2006-02-062007-08-23Jon SiegalMethod and system for providing online authentication utilizing biometric data
WO2007094165A1 (en)2006-02-152007-08-23Nec CorporationId system and program, and id method
US7263717B1 (en)2003-12-172007-08-28Sprint Communications Company L.P.Integrated security framework and privacy database scheme
JP2007220075A (en)2006-01-192007-08-30Toshiba Corp Personal authentication device, position information transmission device, personal authentication system, personal authentication method, and personal authentication program
US20070217590A1 (en)2006-03-172007-09-20David LoupiaApparatus and System for Representation of Voices of Participants to a Conference Call
JP2007249726A (en)2006-03-172007-09-27Hitachi Software Eng Co LtdAuthentication system
US20070234417A1 (en)2002-12-312007-10-04International Business Machines CorporationMethod and system for native authentication protocols in a heterogeneous federated environment
US20070239980A1 (en)2006-04-102007-10-11Fujitsu LimitedAuthentication method, authentication apparatus and authentication program storage medium
US20070278291A1 (en)2005-12-222007-12-06Rans Jean-Paul EMethods and Systems for Two-Factor Authentication Using Contactless Chip Cards or Devices and Mobile Devices or Dedicated Personal Readers
US20070288380A1 (en)2006-04-282007-12-13Ed StarrsMethod and apparatus for online check processing
US20070286130A1 (en)2006-06-122007-12-13Huai-Rong ShaoSystem and method for wireless communication of uncompressed video having a link control and bandwidth reservation scheme for control/management message exchanges and asynchronous traffic
US20080005562A1 (en)2005-12-132008-01-03Microsoft CorporationPublic key infrastructure certificate entrustment
JP2008017301A (en)2006-07-072008-01-24Ntt Docomo Inc Near field communication terminal and security level setting method
US20080024302A1 (en)2006-07-262008-01-31Nec CorporationAsset management system, asset management method, information processor, management device, and program
US20080028453A1 (en)2006-03-302008-01-31Thinh NguyenIdentity and access management framework
US20080025234A1 (en)*2006-07-262008-01-31Qi ZhuSystem and method of managing a computer network using hierarchical layer information
US20080034207A1 (en)2006-08-012008-02-07Cisco Technology, Inc.Method and apparatus for selecting an appropriate authentication method on a client
US20080046334A1 (en)2000-04-062008-02-21Lee Walter WIdentification and management of fraudulent credit/debit card purchases at merchant ecommerce sites
US20080046984A1 (en)2006-08-172008-02-21Iana Livia BohmerFederated credentialing system and method
US20080049983A1 (en)2004-11-162008-02-28Imageware Systems, Inc.Multimodal biometric platform
US20080072054A1 (en)2002-09-162008-03-20Samsung Electronics Co., Ltd.Method of managing metadata
JP2008065844A (en)2007-10-102008-03-21Quality KkInformation processing system
US20080086759A1 (en)2006-10-102008-04-10Colson Christen JVerification and authentication systems and methods
US20080134311A1 (en)2006-12-012008-06-05Microsoft CorporationAuthentication delegation based on re-verification of cryptographic evidence
US20080141339A1 (en)2006-12-112008-06-12Sap AgMethod and system for authentication
US20080172725A1 (en)2007-01-162008-07-17Yoshihiro FujiiSystem, apparatus, and program for biometric authentication
US20080184351A1 (en)2006-05-162008-07-31Transactionsecure, LlcSystem and method for authenticating a person's identity using a trusted entity
US20080189212A1 (en)2006-12-212008-08-07Michael KulakowskiElectronic secure authentication for exchange buyer assurance system (eSafeBay)
US20080209545A1 (en)2007-01-242008-08-28Tomoyuki AsanoAuthentication System, Information Processing Apparatus and Method, Program, and Recording Medium
US20080235801A1 (en)2007-03-202008-09-25Microsoft CorporationCombining assessment models and client targeting to identify network security vulnerabilities
US20080232565A1 (en)2007-02-272008-09-25Andres KuttCommunications system
US7444368B1 (en)2000-02-292008-10-28Microsoft CorporationMethods and systems for selecting methodology for authenticating computer systems on a per computer system or per user basis
US20080271150A1 (en)2007-04-302008-10-30Paul BoergerSecurity based on network environment
US20080289019A1 (en)2007-05-152008-11-20Oracle International CorporationFramework for automated dissemination of security metadata for distributed trust establishment
US20080289020A1 (en)2007-05-152008-11-20Microsoft CorporationIdentity Tokens Using Biometric Representations
US20080313719A1 (en)2007-03-232008-12-18Kaliski Jr Burton SMethods and Apparatus for Delegated Authentication
US20080320308A1 (en)2007-06-202008-12-25Nokia CorporationMethod for remote message attestation in a communication system
US20090025084A1 (en)2007-05-112009-01-22Fraud Management Technologies Pty LtdFraud detection filter
US7487357B2 (en)1999-09-032009-02-03Aladdin Knowledge SystemsVirtual smart card system and method
US20090049510A1 (en)2007-08-152009-02-19Samsung Electronics Co., Ltd.Securing stored content for trusted hosts and safe computing environments
US20090055322A1 (en)2007-08-232009-02-26Microsoft CorporationRemovable module in personal handheld devices for personal information exchange
US20090064292A1 (en)2006-10-192009-03-05Carter Stephen RTrusted platform module (tpm) assisted data center management
CN101394283A (en)2008-11-042009-03-25西安西电捷通无线网络通信有限公司 A Trusted Platform Verification Method Based on Ternary Peer Authentication (TePA)
US20090083850A1 (en)2007-09-242009-03-26Apple Inc.Embedded authentication systems in an electronic device
US7512567B2 (en)2006-06-292009-03-31Yt Acquisition CorporationMethod and system for providing biometric authentication at a point-of-sale via a mobile device
US20090089870A1 (en)2007-09-282009-04-02Mark Frederick WahlSystem and method for validating interactions in an identity metasystem
US20090100269A1 (en)2007-10-122009-04-16Compagnie Industrielle Et Financiere D'ingenierie "Ingenico"Biometric authentication method, computer program, authentication server, corresponding terminal and portable object
US20090119221A1 (en)2007-11-052009-05-07Timothy Martin WestonSystem and Method for Cryptographically Authenticated Display Prompt Control for Multifunctional Payment Terminals
US20090116651A1 (en)2006-07-122009-05-07Huawei Technologies Co., Ltd.Method and system for generating and distributing mobile ip key
US20090133113A1 (en)2007-11-152009-05-21Schneider James PAdding client authentication to networked communications
US20090138724A1 (en)2007-11-262009-05-28Industrial Technology Research InstituteBiometric method and apparatus and biometric data encryption method thereof
US20090138727A1 (en)2007-11-282009-05-28Hitachi Global Storage Technologies Netherlands B.V.Challenge And Response Access Control Providing Data Security In Data Storage Devices
US20090158425A1 (en)2007-12-182009-06-18Oracle International CorporationUser definable policy for graduated authentication based on the partial orderings of principals
US20090164797A1 (en)2007-12-212009-06-25Upek, Inc.Secure off-chip processing such as for biometric data
US20090183003A1 (en)2000-12-272009-07-16Nokia CorporationAuthentication in data communication
US20090187988A1 (en)2008-01-182009-07-23Microsoft CorporationCross-network reputation for online services
CN101495956A (en)2005-08-112009-07-29晟碟以色列有限公司Extended one-time password method and apparatus
US20090193508A1 (en)2008-01-292009-07-30International Business Machines CorporationMethods, devices, and computer program products for discovering authentication servers and establishing trust relationships therewith
US20090199264A1 (en)2008-01-312009-08-06Intuit Inc.Dynamic trust model for authenticating a user
US20090196418A1 (en)2008-02-042009-08-06Freescale Semiconductor, Inc.Encryption Apparatus with Diverse Key Retention Schemes
US20090204964A1 (en)2007-10-122009-08-13Foley Peter FDistributed trusted virtualization platform
US20090235339A1 (en)2008-03-112009-09-17Vasco Data Security, Inc.Strong authentication token generating one-time passwords and signatures upon server credential verification
US20090240624A1 (en)2008-03-202009-09-24Modasolutions CorporationRisk detection and assessment of cash payment for electronic purchase transactions
JP2009223452A (en)2008-03-142009-10-01Hitachi LtdAuthentication system, and authentication server device and user device and application server device
US20090245507A1 (en)2008-03-212009-10-01Renesas Technology Corp.Data processing system and data processing method
US20090271618A1 (en)2006-08-312009-10-29International Business Machines CorporationAttestation of computing platforms
US20090271635A1 (en)2006-08-182009-10-29Huawei Technologies Co., Ltd.Methods and systems for authentication
US20090300714A1 (en)2008-05-272009-12-03Open Invention Network LlcPrivacy engine and method of use in a user-centric identity management system
US20090300720A1 (en)2008-05-302009-12-03Microsoft CorporationCentralized account reputation
US20090307139A1 (en)2008-06-062009-12-10Ebay, Inc.Biometric authentication of mobile financial transactions by trusted service managers
WO2009158530A2 (en)2008-06-252009-12-30Microsoft CorporationRemote access between upnp devices
US20090327131A1 (en)2008-04-292009-12-31American Express Travel Related Services Company, Inc.Dynamic account authentication using a mobile device
US20090328197A1 (en)2004-12-162009-12-31Mark Dwight NewellUser validation using images
US20100010932A1 (en)2008-07-092010-01-14Simon LawSecure wireless deposit system and method
JP2010015263A (en)2008-07-012010-01-21Kddi CorpMutual authentication system, mutual authentication method, and program
US20100023454A1 (en)2008-07-282010-01-28International Business Machines CorporationTransaction Authorization
US20100029300A1 (en)2008-07-302010-02-04Arima Communications Corp.Method for inquiring real-time travel-related information using a mobile communication device
JP2010505286A (en)2006-06-272010-02-18マイクロソフト コーポレーション Biometric certificate validation framework
US20100042848A1 (en)2008-08-132010-02-18Plantronics, Inc.Personalized I/O Device as Trusted Data Source
US20100062744A1 (en)2008-09-082010-03-11Ibrahim Wael MRetrieving data wirelessly from a mobile device
US20100070424A1 (en)2007-06-042010-03-18Monk Justin TSystem, apparatus and methods for comparing fraud parameters for application during prepaid card enrollment and transactions
WO2010032216A1 (en)2008-09-192010-03-25Logomotion, S.R.O.The electronic payment application system and payment authorization method
US20100083000A1 (en)2008-09-162010-04-01Validity Sensors, Inc.Fingerprint Sensor Device and System with Verification Token and Methods of Using
US20100082484A1 (en)2008-09-302010-04-01Avaya Inc.Proxy-Based, Transaction Authorization System
US7698565B1 (en)2000-03-302010-04-13Digitalpersona, Inc.Crypto-proxy server and method of using the same
US20100094681A1 (en)2007-12-052010-04-15Almen Kevin DSystem and Method for Electronically Assisting a Customer at a Product Retail Location
US20100107222A1 (en)2006-03-022010-04-29Avery GlasserMethod and apparatus for implementing secure and adaptive proxies
US20100105427A1 (en)2008-10-242010-04-29Shekhar GuptaTelecommunications system and method for monitoring the body temperature of a user
US20100114776A1 (en)2008-11-062010-05-06Kevin WellerOnline challenge-response
US20100121855A1 (en)2003-06-252010-05-13Microsoft CorporationLookup Partitioning Storage System and Method
WO2010067433A1 (en)2008-12-112010-06-17三菱電機株式会社Self-authentication communication device, self-authentication verification communication device, device authentication system, device authentication method for device authentication system, self-authentication communication program, and self-authentication verification communication program
US20100169650A1 (en)2008-12-312010-07-01Brickell Ernest FStorage minimization technique for direct anonymous attestation keys
US20100175116A1 (en)2009-01-062010-07-08Qualcomm IncorporatedLocation-based system permissions and adjustments at an electronic device
US20100186072A1 (en)2009-01-212010-07-22Akshay KumarDistributed secure telework
US20100191612A1 (en)2009-01-282010-07-29Gregory G. RaleighVerifiable device assisted service usage monitoring with reporting, synchronization, and notification
US20100192209A1 (en)2009-01-232010-07-29Microsoft CorporationPassive security enforcement
US20100205658A1 (en)2009-02-122010-08-12International Business Machines CorporationSystem, method and program product for generating a cancelable biometric reference template on demand
US20100211792A1 (en)2009-02-172010-08-19Microsoft CorporationCommunication channel access based on channel identifier and use policy
US20100223663A1 (en)2006-04-212010-09-02Mitsubishi Electric CorporationAuthenticating server device, terminal device, authenticating system and authenticating method
US20100242088A1 (en)2009-03-172010-09-23Thomas Andrew JComputer security lock down methods
US20100266128A1 (en)2007-10-162010-10-21Nokia CorporationCredential provisioning
US20100299738A1 (en)2009-05-192010-11-25Microsoft CorporationClaims-based authorization at an identity provider
US20100299265A1 (en)2007-04-172010-11-25Hypercom CorporationMethods and systems for security authentication and key exchange
US20100325684A1 (en)2009-06-172010-12-23Microsoft CorporationRole-based security for messaging administration and management
US20100325427A1 (en)2009-06-222010-12-23Nokia CorporationMethod and apparatus for authenticating a mobile device
US20100325711A1 (en)2009-06-232010-12-23Craig Stephen EtchegoyenSystem and Method for Content Delivery
US20100325664A1 (en)2009-06-232010-12-23Samsung Electronics Co. Ltd.Method and apparatus for displaying electric program guide
US7865937B1 (en)2009-08-052011-01-04Daon Holdings LimitedMethods and systems for authenticating users
US20110004933A1 (en)1999-09-202011-01-06Dickinson Alexander GContext Sensitive Dynamic Authentication in A Cryptographic System
US20110004918A1 (en)2007-09-282011-01-06Alcatel-LucentFacilitating heterogeneous authentication for allowing network access
US20110022835A1 (en)2009-07-272011-01-27Suridx, Inc.Secure Communication Using Asymmetric Cryptography and Light-Weight Certificates
US20110047608A1 (en)2009-08-242011-02-24Richard LevenbergDynamic user authentication for access to online services
US20110071841A1 (en)2008-02-152011-03-24Ddn Ip Holdings LimitedDistribution of digital content
US20110078443A1 (en)2009-09-302011-03-31Greenstein Benjamin MMethod and system for secure communications on a managed network
US20110083016A1 (en)2009-10-062011-04-07Validity Sensors, Inc.Secure User Authentication Using Biometric Information
US20110093942A1 (en)2008-06-202011-04-21Koninklijke Philips Electronics N.V.Improved biometric authentication and identification
US20110099361A1 (en)2009-04-152011-04-28Interdigital Patent Holdings, Inc.Validation And/Or Authentication Of A Device For Communication With Network
US20110107087A1 (en)2009-11-042011-05-05Samsung Electronics Co. Ltd.Apparatus and method for refreshing master session key in wireless communication system
TW201121280A (en)2009-12-102011-06-16Mao-Cong LinNetwork security verification method and device and handheld electronic device verification method.
US20110157346A1 (en)2009-11-112011-06-30Grzegorz ZyzdrynApparatus and method for determining sequencing of fingers in images to a two-finger scanner of fingerprint images
US20110167472A1 (en)2009-11-022011-07-07International Business Machines CorporationEndpoint-Hosted Hypervisor Management
US20110167154A1 (en)2004-12-072011-07-07Pure Networks, Inc.Network management
US20110184838A1 (en)2010-01-262011-07-28Michelle WintersTransaction data repository for risk analysis
US20110191200A1 (en)2010-02-042011-08-04Lex BayerMethod and system for authenticating online transactions
US20110197267A1 (en)2010-02-052011-08-11Vivianne GravelSecure authentication system and method
US20110219427A1 (en)2010-03-042011-09-08RSSBus, Inc.Smart Device User Authentication
CN102187701A (en)2008-10-202011-09-14微软公司User authentication management
US20110225643A1 (en)2010-03-122011-09-15Igor FaynbergSecure dynamic authority delegation
US20110225431A1 (en)2010-03-102011-09-15Dell Products L.P.System and Method for General Purpose Encryption of Data
US20110228330A1 (en)2010-03-182011-09-22Brother Kogyo Kabushiki KaishaWireless Communication System
US20110231911A1 (en)2010-03-222011-09-22Conor Robert WhiteMethods and systems for authenticating users
US20110246766A1 (en)2010-03-312011-10-06Security First Corp.Systems and methods for securing data in motion
US20110265159A1 (en)2008-11-042011-10-27Troy Jacob RondaSystem and Methods for Online Authentication
US8060922B2 (en)2004-12-202011-11-15Emc CorporationConsumer internet authentication device
US20110279228A1 (en)2010-05-122011-11-17Weyond Conferencing LLCSystem and Method for Remote Test Administration and Monitoring
US20110280402A1 (en)2006-11-302011-11-17Ibrahim Wael MMethods and systems for utilizing cryptographic functions of a cryptographic co-processor
US20110296518A1 (en)2010-05-282011-12-01Igor FaynbergApplication layer authentication in packet networks
US20110307949A1 (en)2009-02-192011-12-15Troy Jacob RondaSystem and methods for online authentication
US20110307706A1 (en)2009-03-252011-12-15Pacid Technologies, LlcMethod and system for securing communication
US20110314549A1 (en)2010-06-162011-12-22Fujitsu LimitedMethod and apparatus for periodic context-aware authentication
US20110313872A1 (en)2007-12-142011-12-22Bank Of America CorporationInformation banking
US20110320823A1 (en)2010-06-252011-12-29Microsoft CorporationTrusted sensors
US20120023568A1 (en)2010-01-222012-01-26Interdigital Patent Holdings, Inc.Method and Apparatus for Trusted Federated Identity Management and Data Access Authorization
US20120018506A1 (en)2009-05-152012-01-26Visa Intrernational Service AssociationVerification of portable consumer device for 3-d secure services
US20120023567A1 (en)2010-07-162012-01-26Ayman HammadToken validation for advanced authorization
US20120030083A1 (en)2010-04-122012-02-02Jim NewmanSystem and method for evaluating risk in fraud prevention
US20120047555A1 (en)2009-04-282012-02-23China Iwncomm Co., Ltd.Platform authentication method suitable for trusted network connect architecture based on tri-element peer authentication
US20120046012A1 (en)2010-08-172012-02-23Qualcomm IncorporatedMobile Device Having Increased Security That Is Less Obtrusive
US20120066757A1 (en)2009-02-052012-03-15Wwpass CorporationAccessing data based on authenticated user, provider and system
US20120075062A1 (en)2010-09-282012-03-29Steven OsmanMethod and system for access to secure resources
US20120084566A1 (en)2010-10-042012-04-05Edward ChinMethods and systems for providing and controlling cryptographic secure communications across unsecured networks
US8166531B2 (en)2003-06-302012-04-24Sony CorporationDevice registration system, device registration server, device registration method, device registration program, storage medium, and terminal device
US20120102553A1 (en)2010-10-222012-04-26Microsoft CorporationMixed-Mode Authentication
US20120124639A1 (en)2010-11-122012-05-17Shaikh Riaz AhmedValidation of consistency and completeness of access control policy sets
US20120124651A1 (en)2009-11-022012-05-17Authentify, Inc.Secure and efficient authentication using plug-in hardware compatible with desktops, laptops and/or smart mobile communication devices such as iphones
US8185457B1 (en)2007-10-252012-05-22United Services Automobile Association (Usaa)Transaction risk analyzer
US20120130898A1 (en)2009-07-072012-05-24Finsphere, Inc.Mobile directory number and email verification of financial transactions
US20120137137A1 (en)2010-11-302012-05-31Brickell Ernest FMethod and apparatus for key provisioning of hardware devices
US20120144461A1 (en)2010-12-072012-06-07Verizon Patent And Licensing Inc.Mobile pin pad
US20120159577A1 (en)2010-12-162012-06-21Microsoft CorporationAnonymous principals for policy languages
US20120191979A1 (en)2009-10-012012-07-26Michael FeldbauSystem and method for electronic signature via proxy
US20120204032A1 (en)2006-05-092012-08-09Syncup CorporationEncryption key exchange system and method
US20120203906A1 (en)*2011-02-082012-08-09AventuraHQ, Inc.Pre-Access Location-Based Rule Initiation in a Virtual Computing Environment
US8245030B2 (en)2008-12-192012-08-14Nai-Yu PaiMethod for authenticating online transactions using a browser
US20120210135A1 (en)2011-02-162012-08-16Santosh Kumar PanchapakesanClient-based authentication
US20120239950A1 (en)2011-03-152012-09-20Lenovo (Singapore) Pte, Ltd.Apparatus and Method for Variable Authentication Requirements
CN102713922A (en)2010-01-122012-10-03维萨国际服务协会 Anytime confirmation of the verification token
US20120249298A1 (en)2011-03-292012-10-04Nokia CorporationMethod and apparatus for providing biometric authentication using distributed computations
US8284043B2 (en)2009-01-232012-10-09Honeywell International Inc.Method of formulating response to expired timer for data link message
US8291468B1 (en)2009-03-302012-10-16Juniper Networks, Inc.Translating authorization information within computer networks
US20120272056A1 (en)2011-04-192012-10-25Hawk And Seal, Inc.Key management using quasi out of band authentication architecture
US20120278873A1 (en)2011-04-292012-11-01William CaleroTechniques for resource operation based on usage, sharing, and recommendations with modular authentication
US20120291114A1 (en)2011-05-132012-11-15Cch IncorporatedSingle sign-on between applications
US20120317297A1 (en)2011-06-072012-12-13Microsoft CorporationEstablishment of a pairing relationship between two or more communication devices
US20120313746A1 (en)2011-06-102012-12-13AliphcomDevice control using sensory input
US20120323717A1 (en)2011-06-162012-12-20OneID, Inc.Method and system for determining authentication levels in transactions
US8353016B1 (en)2008-02-292013-01-08Adobe Systems IncorporatedSecure portable store for security skins and authentication information
US20130013931A1 (en)2011-03-072013-01-10Security First Corp.Secure file sharing method and system
US8359045B1 (en)2007-05-312013-01-22United Services Automobile Association (Usaa)Method and system for wireless device communication
JP2013016070A (en)2011-07-052013-01-24Interman CorpLogon support system
US20130042115A1 (en)2011-08-092013-02-14CloudPassage, Inc.Systems and methods for implementing security in a cloud computing environment
US20130042327A1 (en)2011-08-122013-02-14Palo Alto Research Center IncorporatedGuided implicit authentication
US20130047200A1 (en)2011-08-152013-02-21Bank Of America CorporationApparatus and Method for Performing Data Tokenization
US20130046976A1 (en)2011-06-032013-02-21Certicom Corp.System and Method for Accessing Private Networks
US20130046991A1 (en)2010-03-082013-02-21Gemalto SaSystem and method for using a portable security device to cryptograhically sign a document in response to signature requests from a relying pary to a digital signature
US20130054967A1 (en)2011-08-302013-02-28Comcast Cable Communications, LlcReoccuring Keying System
US20130055370A1 (en)2011-08-242013-02-28International Business Machines CorporationSecurity for future log-on location
US20130054336A1 (en)2011-04-052013-02-28Roam Data IncSystem and method for incorporating one-time tokens, coupons, and reward systems into merchant point of sale checkout systems
US20130061055A1 (en)2007-11-082013-03-07SurlDx, Inc.Apparatus and Methods for Providing Scalable, Dynamic, Individualized Credential Services Using Mobile Telephones
US20130067546A1 (en)2011-09-082013-03-14International Business Machines CorporationTransaction authentication management system with multiple authentication levels
US20130073859A1 (en)2011-09-212013-03-21Visa International Service AssociationSystems and methods to secure user identification
US8412928B1 (en)2010-03-312013-04-02Emc CorporationOne-time password authentication employing local testing of candidate passwords from one-time password server
US20130086669A1 (en)2011-09-292013-04-04Oracle International CorporationMobile application, single sign-on management
US20130090939A1 (en)*2011-10-112013-04-11Robert N. RobinsonSytem and method for preventing healthcare fraud
US20130097682A1 (en)2011-10-132013-04-18Ilija ZeljkovicAuthentication Techniques Utilizing a Computing Device
US20130104190A1 (en)*2010-07-082013-04-25Steven J. SimskeSystem and method for document policy enforcement
US20130104187A1 (en)2011-10-182013-04-25Klaus Helmut WeidnerContext-dependent authentication
US20130125222A1 (en)2008-08-192013-05-16James D. PravetzSystem and Method for Vetting Service Providers Within a Secure User Interface
US20130124422A1 (en)2011-11-102013-05-16Intryca Inc.Systems and methods for authorizing transactions via a digital device
US20130124285A1 (en)2008-08-202013-05-16James D. PravetzSystem and Method for Trusted Embedded User Interface for Secure Payments
US20130119130A1 (en)2011-11-142013-05-16Vasco Data Security, Inc.Smart card reader with a secure logging feature
US20130125197A1 (en)2008-02-292013-05-16James D. PravetzRelying Party Specifiable Format for Assertion Provider Token
US20130133054A1 (en)2011-09-242013-05-23Marc E. DavisRelationship Based Trust Verification Schema
US20130133049A1 (en)2011-11-222013-05-23Michael PeirceMethods and systems for determining biometric data for use in authentication transactions
US8458465B1 (en)2005-11-162013-06-04AT&T Intellectual Property II, L. P.Biometric authentication
US20130144785A1 (en)2011-03-292013-06-06Igor KarpenkoSocial network payment authentication apparatuses, methods and systems
WO2013082190A1 (en)2011-11-282013-06-06Visa International Service AssociationTransaction security graduated seasoning and risk shifting apparatuses, methods and systems
US20130160083A1 (en)2010-08-232013-06-203M Innovative Properties CompanyMethod and device for challenge-response authentication
JP2013122736A (en)2011-12-122013-06-20Tohsho CorpPoint management system
US20130160100A1 (en)2011-12-162013-06-20Richard Jay LangleyMethods and systems for increasing the security of network-based transactions
US20130159716A1 (en)2002-05-102013-06-20Prism Technologies LlcMethod for personalizing an authentication token
US20130159413A1 (en)2011-09-242013-06-20Elwha LLC, a limited liability corporation of the State of DelawareBehavioral fingerprinting with social networking
US20130167196A1 (en)2007-06-062013-06-27Boldstreet Inc.System and method for remote device recognition at public hotspots
US8489506B2 (en)2006-06-192013-07-16Visa U.S.A. Inc.Portable consumer device verification system
US20130191884A1 (en)2012-01-202013-07-25Interdigital Patent Holdings, Inc.Identity management with local functionality
US20130212637A1 (en)2010-03-022013-08-15Interdigital Patent Holdings, Inc.Migration of credentials and/or domains between trusted hardware subscription modules
US20130219456A1 (en)2012-01-062013-08-22Rahul SharmaSecure Virtual File Management System
US20130227646A1 (en)2012-02-142013-08-29Apple Inc.Methods and apparatus for large scale distribution of electronic access clients
US8526607B2 (en)2009-03-202013-09-03Sichuan Changhong Electric Co., Ltd.Identity authentication and shared key generation method
US20130239173A1 (en)2012-03-122013-09-12Stephen T. DispensaComputer program and method for administering secure transactions using secondary authentication
US20130246272A1 (en)*2012-03-122013-09-19OneID Inc.Secure mobile transactions
US20130262305A1 (en)2012-03-272013-10-03International Business Machines CorporationAuthentication for transactions using near field communication
US8561152B2 (en)2011-05-172013-10-15Microsoft CorporationTarget-based access check independent of access request
US20130276060A1 (en)2003-06-052013-10-17Ulrich WiedmannMethods and systems for fallback modes of operation within wireless computer networks
US20130282589A1 (en)2012-04-202013-10-24Conductiv Software, Inc.Multi-factor mobile transaction authentication
US8584224B1 (en)2011-04-132013-11-12Symantec CorporationTicket based strong authentication with web service
US8584219B1 (en)2012-11-072013-11-12Fmr LlcRisk adjusted, multifactor authentication
US20130308778A1 (en)2012-05-212013-11-21Klaus S. FosmarkSecure registration of a mobile device for use with a session
US20130318343A1 (en)2012-05-222013-11-28Cisco Technology, Inc.System and method for enabling unconfigured devices to join an autonomic network in a secure manner
US20130326215A1 (en)2012-06-052013-12-05Cleversafe, Inc.Establishing trust within a cloud computing system
US20130337777A1 (en)2012-03-282013-12-19Steven W. DeutschConditional limited service grant based on device verification
US20130346176A1 (en)2012-06-202013-12-26Zachery AlolabiSystem and method for payment incentivizing
US20130347064A1 (en)2012-06-152013-12-26Visa International Services AssociationMethod and apparatus for secure application execution
US20140002238A1 (en)2012-07-022014-01-02Validity Sensors, Inc.Credential quality assessment engine systems and methods
US20140007215A1 (en)2012-06-152014-01-02Lockheed Martin CorporationMobile applications platform
US20140006776A1 (en)2012-06-292014-01-02Mark Scott-NashCertification of a virtual trusted platform module
US20140013422A1 (en)2012-07-032014-01-09Scott JanusContinuous Multi-factor Authentication
WO2014011997A1 (en)2012-07-132014-01-16Interdigital Patent Holdings, Inc.Methods and systems for authenticating a user of a wireless unit
US20140033271A1 (en)2011-10-112014-01-30Citrix Systems, Inc.Policy-Based Application Management
US8646060B1 (en)2013-07-302014-02-04Mourad Ben AyedMethod for adaptive authentication using a mobile device
US20140037092A1 (en)2012-08-022014-02-06Gm Global Technology Operations, Inc.Method and system of reconstructing a secret code in a vehicle for performing secure operations
US20140040987A1 (en)2010-09-132014-02-06Zynga Inc.Network Application Security Utilizing Network-Provided Identities
US20140047510A1 (en)2012-08-132014-02-13Wells Fargo, N.A.Wireless multi-factor authentication with captive portals
US20140044265A1 (en)2012-08-102014-02-13Cryptography Research, Inc.Secure feature and key management in integrated circuits
US20140066015A1 (en)2012-08-282014-03-06Selim AissiSecure device service enrollment
US20140068746A1 (en)2010-11-242014-03-06Diego González MartínezMethod for authorizing access to protected content
US20140075516A1 (en)2012-09-122014-03-13Michael ChermsideSystem and method for providing controlled application programming interface security
US20140090039A1 (en)2012-09-242014-03-27Plantronics, Inc.Secure System Access Using Mobile Biometric Devices
US20140090088A1 (en)2012-09-272014-03-27Microsoft CorporationFacilitating Claim Use by Service Providers
US20140089243A1 (en)2012-01-082014-03-27Steven Charles OppenheimerSystem and Method For Item Self-Assessment As Being Extant or Displaced
US20140096182A1 (en)2012-09-292014-04-03Ned M. SmithSystems and methods for distributed trust computing and key management
US20140101439A1 (en)2012-10-052014-04-10General Electric CompanySystems and methods for authentication between networked devices
US20140109174A1 (en)2012-10-152014-04-17Citrix Systems, Inc.Providing Virtualized Private Network Tunnels
US20140115702A1 (en)2012-10-192014-04-24Xiaoning LiEncrypted data inspection in a network environment
US20140114857A1 (en)2012-10-232014-04-24Alfred William GriggsTransaction initiation determination system utilizing transaction data elements
US8719905B2 (en)2010-04-262014-05-06Authentify Inc.Secure and efficient login and transaction authentication using IPhones™ and other smart mobile communication devices
CN103793632A (en)2014-02-282014-05-14汕头大学Method and device for transferring access permission control service of digital content products
US20140137191A1 (en)2012-11-142014-05-15Research In Motion LimitedMobile communications device providing heuristic security authentication features and related methods
US8745698B1 (en)2009-06-092014-06-03Bank Of America CorporationDynamic authentication engine
US20140164776A1 (en)2012-02-202014-06-12Lock Box Pty LtdCryptographic method and system
US20140173754A1 (en)2012-12-182014-06-19Bank Of America CorporationIdentity Attribute Exchange and Validation Broker
CN103888252A (en)2012-12-192014-06-25深圳市华营数字商业有限公司UID, PID, and APPID-based control application access permission method
US20140189360A1 (en)*2012-12-282014-07-03Davit BaghdasaryanSystem and method for implementing transaction signing within an authentication framework
US20140189828A1 (en)*2012-12-282014-07-03Davit BaghdasaryanSystem and method for processing random challenges within an authentication framework
US20140189807A1 (en)2011-10-182014-07-03Conor P. CahillMethods, systems and apparatus to facilitate client-based authentication
US20140189350A1 (en)*2012-12-282014-07-03Davit BaghdasaryanSystem and method for efficiently enrolling, registering, and authenticating with multiple authentication devices
US20140189835A1 (en)2012-12-282014-07-03Pitney Bowes Inc.Systems and methods for efficient authentication of users
US20140189808A1 (en)2012-12-282014-07-03Lookout, Inc.Multi-factor authentication and comprehensive login system for client-server networks
US20140188770A1 (en)2011-05-102014-07-03Foteini AgrafiotiSystem and method for enabling continuous or instantaneous identity recognition based on physiological biometric signals
WO2014105994A2 (en)2012-12-282014-07-03Nok Nok Labs, Inc.Query system and method to determine authentication capabilities
US20140189791A1 (en)*2012-12-282014-07-03Rolf LindemannSystem and method for implementing privacy classes within an authentication framework
US20140189779A1 (en)*2012-12-282014-07-03Davit BaghdasaryanQuery system and method to determine authenticatin capabilities
US8776180B2 (en)2012-05-012014-07-08Taasera, Inc.Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms
CN103945374A (en)2013-01-182014-07-23深圳市华营数字商业有限公司Method of mobile terminal equipment and user authentication based on PKI technology
US20140230032A1 (en)2013-02-132014-08-14Daniel DuncanSystems and Methods for Identifying Biometric Information as Trusted and Authenticating Persons Using Trusted Biometric Information
US20140245391A1 (en)2011-10-312014-08-28Money And Data Protection Lizenz Gmbh & Co. KgAuthentication Method
US20140250011A1 (en)2013-03-012014-09-04Lance WeberAccount type detection for fraud risk
US20140250523A1 (en)2012-10-112014-09-04Carnegie Mellon UniversityContinuous Authentication, and Methods, Systems, and Software Therefor
US20140258125A1 (en)2004-05-032014-09-11Gary E. GerberMultiple party benefit from an online authentication
US20140258711A1 (en)2014-05-202014-09-11Airwatch LlcApplication Specific Certificate Management
US20140279516A1 (en)2013-03-142014-09-18Nicholas RellasAuthenticating a physical device
US20140282868A1 (en)2013-03-152014-09-18Micah ShellerMethod And Apparatus To Effect Re-Authentication
US20140282945A1 (en)2013-03-152014-09-18Intel CorporationTechnologies for secure storage and use of biometric authentication information
US20140282965A1 (en)2011-04-112014-09-18NSS Lab Works LLCOngoing Authentication and Access Control with Network Access Device
US8843997B1 (en)2009-01-022014-09-23Resilient Network Systems, Inc.Resilient trust network services
US20140289117A1 (en)2013-03-222014-09-25Davit BaghdasaryanSystem and method for user confirmation of online transactions
US20140289833A1 (en)2013-03-222014-09-25Marc BricenoAdvanced authentication techniques and applications
US20140298419A1 (en)2003-09-302014-10-02Ca, Inc.System and method for bridging identities in a service oriented architectureprofiling
US8856541B1 (en)2013-01-102014-10-07Google Inc.Liveness detection
US20140304505A1 (en)2013-03-152014-10-09William Johnson DawsonAbstraction layer for default encryption with orthogonal encryption logic session object; and automated authentication, with a method for online litigation
US20140325239A1 (en)2010-07-152014-10-30The Research Foundation For The State University Of New YorkSystem and method for validating program execution at run-time using control flow signatures
US20140333413A1 (en)2013-05-082014-11-13Eren KursunSystems And Methods For High Fidelity Multi-Modal Out-Of-Band Biometric Authentication
US20140335824A1 (en)2013-05-132014-11-13Dennis Thomas AbrahamSystem and Method for Data Verification Using a Smart Phone
US20140337948A1 (en)2013-05-132014-11-13Hoyos Labs Corp.System and method for determining liveness
US20150019220A1 (en)2012-01-242015-01-15Auraya Pty LtdVoice authentication and speech recognition system and method
US8949978B1 (en)2010-01-062015-02-03Trend Micro Inc.Efficient web threat protection
US20150046340A1 (en)2013-08-062015-02-12James Dene DimmickVariable authentication process and system
US8958599B1 (en)2012-01-062015-02-17Google Inc.Input method and system based on ambient glints
US20150058931A1 (en)2013-08-232015-02-26Morphotrust Usa, LlcSystem and Method for Identity Management
US8978117B2 (en)2007-11-192015-03-10Avaya Inc.Authentication frequency and challenge type based on environmental and physiological properties
US20150096002A1 (en)2013-09-302015-04-02Laird H. ShuartMethod of Criminal Profiling and Person Identification Using Cognitive/Behavioral Biometric Fingerprint Analysis
US20150095999A1 (en)2013-10-012015-04-02Kalman Csaba TothElectronic Identity and Credentialing System
US20150121068A1 (en)2013-10-292015-04-30Rolf LindemannApparatus and method for implementing composite authenticators
US9032485B2 (en)2010-03-182015-05-12Zte CorporationAnchor authenticator relocation method and system
US20150134330A1 (en)2013-03-142015-05-14Intel CorporationVoice and/or facial recognition based service provision
US20150142628A1 (en)2013-11-202015-05-21Bank Of America CorporationDetecting structured transactions
US20150180869A1 (en)2013-12-232015-06-25Samsung Electronics Company, Ltd.Cloud-based scalable authentication for electronic devices
US20150193781A1 (en)2014-01-072015-07-09Bank Of America CorporationKnowledge Based Verification of the Identity of a User
US20150244525A1 (en)2013-05-302015-08-27CertiVox Ltd.Authentication
US20150242605A1 (en)2014-02-232015-08-27Qualcomm IncorporatedContinuous authentication with a mobile device
US20150244696A1 (en)2014-02-272015-08-27Veritrix, Inc.Methods of Authenticating Users to a Site
WO2015130734A1 (en)2014-02-252015-09-03Uab Research FoundationTwo-factor authentication systems and methods
US20150269050A1 (en)2014-03-182015-09-24Microsoft CorporationUnsupervised anomaly detection for arbitrary time series
US9161209B1 (en)2013-08-212015-10-13Sprint Communications Company L.P.Multi-step mobile device initiation with intermediate partial reset
US9171306B1 (en)2010-03-292015-10-27Bank Of America CorporationRisk-based transaction authentication
US20150326529A1 (en)2013-03-112015-11-12Hitachi Automotive Systems, Ltd.Gateway device, and service providing system
US20150373039A1 (en)2014-06-232015-12-24Niara, Inc.Entity Group Behavior Profiling
US20150381580A1 (en)2010-04-302015-12-31Donald Houston Graham, IIISystem and method to use a cloud-based platform supported by an api to authenticate remote users and to provide pki- and pmi- based distributed locking of content and distributed unlocking of protected content
US20160036588A1 (en)2010-11-232016-02-04Concierge Holdings, Inc.System and method for verifying user identity in a virtual environment
US20160034892A1 (en)2013-04-152016-02-04Visa Europe LimitedMethod and system for transmitting credentials
US20160072787A1 (en)2002-08-192016-03-10Igor V. BalabineMethod for creating secure subnetworks on a general purpose network
US20160071105A1 (en)2014-09-082016-03-10Mastercard International IncorporatedSystems and methods for using social network data to determine payment fraud
US20160078869A1 (en)2011-05-052016-03-17At&T Intellectual Property I, L.P.System and method for dynamic facial features for speaker recognition
US20160087952A1 (en)2014-09-232016-03-24Qualcomm IncorporatedScalable authentication process selection based upon sensor inputs
US20160087957A1 (en)2013-04-262016-03-24Interdigital Patent Holdings, Inc.Multi-factor authentication to achieve required authentication assurance level
US9317705B2 (en)2005-11-182016-04-19Security First Corp.Secure data parser method and system
US20160134421A1 (en)2011-07-292016-05-12Hewlett Packard Enterprise Development LpCredential validation
US9367678B2 (en)2012-02-292016-06-14Red Hat, Inc.Password authentication
US20160188958A1 (en)2014-12-312016-06-30Morphotrust Usa, LlcDetecting Facial Liveliness
US20160292687A1 (en)2014-10-132016-10-06Empire Technology Development LlcVerification location determination for entity presence confirmation of online purchases
US20170004487A1 (en)2015-07-012017-01-05Klarna AbMethod for using supervised model with physical store
US20170011406A1 (en)2015-02-102017-01-12NXT-ID, Inc.Sound-Directed or Behavior-Directed Method and System for Authenticating a User and Executing a Transaction
US9547760B2 (en)2012-02-242017-01-17Samsung Electronics Co., Ltd.Method and system for authenticating user of a mobile device via hybrid biometics information
US20170048070A1 (en)2015-08-102017-02-16Data I/O CorporationDevice birth certificate
US20170085587A1 (en)2010-11-292017-03-23Biocatch Ltd.Device, method, and system of generating fraud-alerts for cyber-attacks
US20170109751A1 (en)2014-05-022017-04-20Nok Nok Labs, Inc.System and method for carrying strong authentication events over different channels
US9633322B1 (en)2013-03-152017-04-25Consumerinfo.Com, Inc.Adjustment of knowledge-based authentication
US9698976B1 (en)2014-02-242017-07-04Wickr Inc.Key management and dynamic perfect forward secrecy
US20170195121A1 (en)2015-12-312017-07-06Microsoft Technology Licensing, Llc.Token binding using trust module protected keys
US20170221068A1 (en)2011-06-302017-08-03Cable Television Laboratories, Inc.Personal authentication
US20170317833A1 (en)2016-04-302017-11-02Civic Technologies, Inc.Methods and apparatus for providing attestation of information using a centralized or distributed ledger
US20170330174A1 (en)2016-05-112017-11-16Nasdaq, Inc.Application framework using blockchain-based asset ownership
US20170330180A1 (en)2016-05-162017-11-16Coinplug, Inc.Method for using and revoking authentication information and blockchain-based server using the same
US20170331632A1 (en)2009-03-312017-11-16Topaz Systems, Inc.Distributed system for multi-function secure verifiable signer authentication
US20170352116A1 (en)2016-06-062017-12-07Chicago Mercantile Exchange Inc.Data payment and authentication via a shared data structure
WO2017219007A1 (en)2016-06-172017-12-21Weimer JonathanBlockchain systems and methods for user authentication
US20180039990A1 (en)2016-08-052018-02-08Nok Nok Labs, Inc.Authentication techniques including speech and/or lip movement analysis
US20180191501A1 (en)2016-12-312018-07-05Nok Nok Labs, Inc.System and method for sharing keys across authenticators
US20180191695A1 (en)2016-12-312018-07-05Nok Nok Labs, Inc.System and method for bootstrapping a user binding
US20190139005A1 (en)2017-11-072019-05-09Mastercard International IncoporatedAch transaction authentication systems and methods
US20190164156A1 (en)2017-11-272019-05-30Nok Nok Labs, Inc.Extending a secure key storage for transaction confirmation and cryptocurrency
US20190205885A1 (en)2017-12-282019-07-04Paypal, Inc.Machine learning engine for fraud detection following link selection
US20190222424A1 (en)2018-01-122019-07-18Nok Nok Labs, Inc.System and method for binding verifiable claims
US20190251234A1 (en)2018-02-142019-08-15American Express Travel Related Services Company, Inc.Authentication challenges based on fraud initiation requests

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5588061A (en)1994-07-201996-12-24Bell Atlantic Network Services, Inc.System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem
AU1539501A (en)1999-12-022001-06-25Oakington Technologies LimitedTransaction system and method
US7233926B2 (en)2000-03-072007-06-19Thomson LicensingElectronic wallet system with secure inter-purses operations
US20030182551A1 (en)2002-03-252003-09-25Frantz Christopher J.Method for a single sign-on
US20040003990A1 (en)*2002-07-022004-01-08Pierre MansurWater purification apparatus and method for purifying water
US7287052B2 (en)2002-11-092007-10-23Microsoft CorporationChallenge and response interaction between client and server computing devices
DE10326893A1 (en)*2003-06-142004-12-30Degussa Ag Resins based on ketones and aldehydes with improved solubility properties and low color numbers
CN1882963A (en)2003-06-302006-12-20塞尔维纳坦·纳拉因萨米Transaction verification system
EP1811421A1 (en)2005-12-292007-07-25AXSionics AGSecurity token and method for authentication of a user with the security token
CN101101687B (en)2006-07-052010-09-01山谷科技有限责任公司Method, apparatus, server and system using biological character for identity authentication
US8818904B2 (en)2007-01-172014-08-26The Western Union CompanyGeneration systems and methods for transaction identifiers having biometric keys associated therewith
CN101276448A (en)2007-03-292008-10-01阿里巴巴集团控股有限公司Payment system and method performing trading with identification card including IC card
CN101051908B (en)2007-05-212011-05-18北京飞天诚信科技有限公司Dynamic cipher certifying system and method
US8134449B2 (en)2007-10-232012-03-13Minebea Co., LtdMethod and system for biometric keyboard
US20120015957A1 (en)*2007-12-172012-01-19Wenying ChaiPiperazinyl derivatives useful as modulators of the neuropeptide y2 receptor
US9061406B2 (en)*2008-08-012015-06-23Guy A. CherryTool for removing remnant of spark plug boot
US8132640B2 (en)*2008-08-072012-03-13Honda Motor Co., Ltd.Frangible mount for a vehicle differential
KR101708345B1 (en)*2010-07-232017-02-21삼성전자 주식회사Apparatus and method for charging battery
US8819437B2 (en)2010-09-302014-08-26Microsoft CorporationCryptographic device that binds an additional authentication factor to multiple identities
US8528069B2 (en)2010-09-302013-09-03Microsoft CorporationTrustworthy device claims for enterprise applications
EP3217696A1 (en)2011-03-232017-09-13InterDigital Patent Holdings, Inc.Device and method for securing network communications
US8953789B2 (en)2011-06-012015-02-10International Business Machines CorporationCombining key control information in common cryptographic architecture services
US8631190B2 (en)*2011-07-222014-01-14International Business Machines CorporationPrefetching data tracks and parity data to use for destaging updated tracks
CN102255917B (en)2011-08-152014-09-03北京宏基恒信科技有限责任公司Method, system and device for updating and synchronizing keys of dynamic token
CN103220145B (en)2013-04-032015-06-17天地融科技股份有限公司Method and system for electronic signature token to respond to operation request, and electronic signature token
CN103475666B (en)2013-09-232017-01-04中国科学院声学研究所A kind of digital signature authentication method of Internet of Things resource
WO2017007705A1 (en)2015-07-062017-01-12Shape Security, Inc.Asymmetrical challenges for web security
US10846390B2 (en)2016-09-142020-11-24Oracle International CorporationSingle sign-on functionality for a multi-tenant identity and data security management cloud service

Patent Citations (489)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5272754A (en)1991-03-281993-12-21Secure Computing CorporationSecure computer interface
US5280527A (en)1992-04-141994-01-18Kamahira Safe Co., Inc.Biometric token for authorizing access to a host system
JPH06195307A (en)1992-12-221994-07-15Fujitsu LtdAutomatic registering device for many and unspecified users
US5764789A (en)1994-11-281998-06-09Smarttouch, LlcTokenless biometric ATM access system
JPH09231172A (en)1996-02-261997-09-05Nippon Denki Ido Tsushin KkPassword registering method
US6088450A (en)1996-04-172000-07-11Intel CorporationAuthentication system based on periodic challenge/response protocol
US5892900A (en)1996-08-301999-04-06Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US6377691B1 (en)1996-12-092002-04-23Microsoft CorporationChallenge-response authentication and key exchange for a connectionless security protocol
US6035406A (en)1997-04-022000-03-07Quintet, Inc.Plurality-factor security system
US20020112157A1 (en)1997-09-222002-08-15Proofspace, Inc.System and method for widely witnessed proof of time
US20020073316A1 (en)1998-02-032002-06-13Thomas CollinsCryptographic system enabling ownership of a secure process
US6618806B1 (en)1998-04-012003-09-09Saflink CorporationSystem and method for authenticating users in a computer network
US6178511B1 (en)1998-04-302001-01-23International Business Machines CorporationCoordinating user target logons in a single sign-on (SSO) environment
US6270011B1 (en)1998-05-282001-08-07Benenson TalRemote credit card authentication system
US6751733B1 (en)1998-09-112004-06-15Mitsubishi Denki Kabushiki KaishaRemote authentication system
US20020054695A1 (en)1998-09-162002-05-09Vance C. BjornConfigurable multi-function touchpad device
US20070088950A1 (en)1998-11-092007-04-19First Data CorporationAccount-based digital signature (abds) system using biometrics
US6510236B1 (en)1998-12-112003-01-21International Business Machines CorporationAuthentication framework for managing authentication requests from multiple authentication devices
US20050187883A1 (en)1999-08-312005-08-25American Express Travel Related Services Company, Inc.Methods and apparatus for conducting electronic transactions using biometrics
US7487357B2 (en)1999-09-032009-02-03Aladdin Knowledge SystemsVirtual smart card system and method
US6842896B1 (en)*1999-09-032005-01-11Rainbow Technologies, Inc.System and method for selecting a server in a multiple server license management system
US20110004933A1 (en)1999-09-202011-01-06Dickinson Alexander GContext Sensitive Dynamic Authentication in A Cryptographic System
US6801998B1 (en)1999-11-122004-10-05Sun Microsystems, Inc.Method and apparatus for presenting anonymous group names
US7444368B1 (en)2000-02-292008-10-28Microsoft CorporationMethods and systems for selecting methodology for authenticating computer systems on a per computer system or per user basis
JP2001325469A (en)2000-02-292001-11-22Internatl Business Mach Corp <Ibm>System and method for relating device for securing electronic commercial transaction
US20010037451A1 (en)2000-03-062001-11-01Bhagavatula Ravishankar S.Centralized identity authentication for electronic communication networks
US7698565B1 (en)2000-03-302010-04-13Digitalpersona, Inc.Crypto-proxy server and method of using the same
US20080046334A1 (en)2000-04-062008-02-21Lee Walter WIdentification and management of fraudulent credit/debit card purchases at merchant ecommerce sites
US20030065805A1 (en)2000-06-292003-04-03Barnes Melvin L.System, method, and computer program product for providing location based services and mobile e-commerce
US20020010857A1 (en)2000-06-292002-01-24Kaleedhass KarthikBiometric verification for electronic transactions over the web
US20020082962A1 (en)2000-07-272002-06-27Farris Robert G.Value transfer system for unbanked customers
US20020016913A1 (en)2000-08-042002-02-07Wheeler Lynn HenryModifying message data and generating random number digital signature within computer chip
US6938156B2 (en)2000-08-042005-08-30First Data CorporationABDS system and verification status for authenticating entity access
US20030135740A1 (en)2000-09-112003-07-17Eli TalmorBiometric-based system and method for enabling authentication of electronic messages sent over a network
US20020037736A1 (en)2000-09-282002-03-28Kenji KawaguchiClosed group communication method and communication terminal equipment
US20020040344A1 (en)2000-10-042002-04-04Preiser Randall F.Check guarantee, verification, processing, credit reports and collection system and method awarding purchase points for usage of checks
JP2002152189A (en)2000-11-142002-05-24Nippon Hoso Kyokai <Nhk> Public key distribution method, public key transmitting device and public key receiving device used in this method
US20020073320A1 (en)2000-12-072002-06-13International Business Machines CorporationAggregated authenticated identity apparatus for and method therefor
US20090183003A1 (en)2000-12-272009-07-16Nokia CorporationAuthentication in data communication
US20020087894A1 (en)2001-01-032002-07-04Foley James M.Method and apparatus for enabling a user to select an authentication method
US7941669B2 (en)2001-01-032011-05-10American Express Travel Related Services Company, Inc.Method and apparatus for enabling a user to select an authentication method
US20020112170A1 (en)2001-01-032002-08-15Foley James M.Method and apparatus for using one financial instrument to authenticate a user for accessing a second financial instrument
US6588812B1 (en)2001-02-222003-07-08The Regents Of The University Of CaliforniaEnhanced tamper indicator
US20020174344A1 (en)*2001-05-182002-11-21Imprivata, Inc.System and method for authentication using biometrics
US20020174348A1 (en)2001-05-182002-11-21Imprivata, Inc.Biometric authentication for remote initiation of actions and services
US20020190124A1 (en)2001-06-152002-12-19Koninklijke Philips Electronics N.V.Point-of-sale (POS) voice authentication transaction system
US20030055792A1 (en)2001-07-232003-03-20Masaki KinoshitaElectronic payment method, system, and devices
US20030021283A1 (en)*2001-07-302003-01-30See Michael E.Distributed network management system using policies
WO2003017159A1 (en)2001-08-102003-02-27Matsushita Electric Industrial Co., Ltd.Electronic device
US20030087629A1 (en)2001-09-282003-05-08Bluesocket, Inc.Method and system for managing data traffic in wireless networks
US20030084300A1 (en)2001-10-232003-05-01Nec CorporationSystem for administrating data including privacy of user in communication made between server and user's terminal device
JP2003143136A (en)2001-10-302003-05-16Toshiba Corp Identity verification system and device
JP2003223235A (en)2001-11-262003-08-08Matsushita Electric Ind Co Ltd Application authentication system
US20030115142A1 (en)2001-12-122003-06-19Intel CorporationIdentity authentication portfolio system
US7194761B1 (en)2002-01-222007-03-20Cisco Technology, Inc.Methods and apparatus providing automatic client authentication
JP2003219473A (en)2002-01-222003-07-31Citizen Watch Co LtdPortable information apparatus, personal authentication system and data managing method
US20030152252A1 (en)2002-02-052003-08-14Kenji KondoPersonal authentication method, personal authentication apparatus and image capturing device
US7155035B2 (en)2002-02-052006-12-26Matsushita Electric Industrial Co., Ltd.Personal authentication method, personal authentication apparatus and image capturing device
JP2003318894A (en)2002-02-212003-11-07Matsushita Electric Ind Co Ltd Authentication processing method between devices by challenge-response method
JP2003274007A (en)2002-03-192003-09-26Nec CorpMobile phone
US20130159716A1 (en)2002-05-102013-06-20Prism Technologies LlcMethod for personalizing an authentication token
US20030226036A1 (en)2002-05-302003-12-04International Business Machines CorporationMethod and apparatus for single sign-on authentication
US20030236991A1 (en)2002-06-202003-12-25Reed LetsingerAllowing an electronic device accessing a service to be authenticated
EP1376302A2 (en)2002-06-242004-01-02Microsoft CorporationSecure media path methods, systems, and architectures
CN1705925A (en)2002-07-032005-12-07富利科技有限公司Biometric private key infrastructure
US20060174037A1 (en)2002-07-292006-08-03Bea Systems, Inc.Identifying a computer device
US20160072787A1 (en)2002-08-192016-03-10Igor V. BalabineMethod for creating secure subnetworks on a general purpose network
US20040039909A1 (en)*2002-08-222004-02-26David ChengFlexible authentication with multiple levels and factors
US20080072054A1 (en)2002-09-162008-03-20Samsung Electronics Co., Ltd.Method of managing metadata
JP2004118456A (en)2002-09-252004-04-15Japan Science & Technology Corp Mobile terminal authentication system using location information
US20040101170A1 (en)2002-11-202004-05-27Christel-Loic TisseEvaluation of the definition of an eye iris image
US20040123153A1 (en)2002-12-182004-06-24Michael WrightAdministration of protection of data accessible by a mobile device
US20070234417A1 (en)2002-12-312007-10-04International Business Machines CorporationMethod and system for native authentication protocols in a heterogeneous federated environment
WO2005003985A1 (en)2003-05-212005-01-13Hitachi, Ltd.User authentication system
JP2004348308A (en)2003-05-212004-12-09Hitachi Ltd Personal authentication system
US20130276060A1 (en)2003-06-052013-10-17Ulrich WiedmannMethods and systems for fallback modes of operation within wireless computer networks
US20100121855A1 (en)2003-06-252010-05-13Microsoft CorporationLookup Partitioning Storage System and Method
US8166531B2 (en)2003-06-302012-04-24Sony CorporationDevice registration system, device registration server, device registration method, device registration program, storage medium, and terminal device
US20050021964A1 (en)2003-07-252005-01-27Bhavna BhatnagarMethod and system for providing a circle of trust on a network
US20050097320A1 (en)2003-09-122005-05-05Lior GolanSystem and method for risk based authentication
JP2005092614A (en)2003-09-182005-04-07Toda Constr Co Ltd Biometric authentication system, program, and information storage medium
US20050080716A1 (en)2003-09-252005-04-14Boris BelyiData validation systems and methods for use in financial transactions
US20140298419A1 (en)2003-09-302014-10-02Ca, Inc.System and method for bridging identities in a service oriented architectureprofiling
US20050100166A1 (en)*2003-11-102005-05-12Parc Inc.Systems and methods for authenticating communications in a network medium
US20050160052A1 (en)2003-11-252005-07-21Schneider John K.Biometric authorization method and system
US20050125295A1 (en)2003-12-092005-06-09Tidwell Lisa C.Systems and methods for obtaining payor information at a point of sale
US7263717B1 (en)2003-12-172007-08-28Sprint Communications Company L.P.Integrated security framework and privacy database scheme
US20060156385A1 (en)2003-12-302006-07-13Entrust LimitedMethod and apparatus for providing authentication using policy-controlled authentication articles and techniques
US20050223236A1 (en)2004-03-302005-10-06Fujitsu LimitedBiometric information verifying apparatus, biometric information narrowing apparatus, and computer-readable recording medium storing a biometric information narrowing program thereon
JP2005316936A (en)2004-03-312005-11-10Dowango:KkCommodity server, method for paying purchase price, method for purchasing commodity, and computer program
US20050223217A1 (en)2004-04-012005-10-06Microsoft CorporationAuthentication broker service
US20140258125A1 (en)2004-05-032014-09-11Gary E. GerberMultiple party benefit from an online authentication
US20050278253A1 (en)2004-06-152005-12-15Microsoft CorporationVerifying human interaction to a computer entity by way of a trusted component on a computing device or the like
US20060029062A1 (en)2004-07-232006-02-09Citrix Systems, Inc.Methods and systems for securing access to private networks using encryption and authentication technology built in to peripheral devices
US8555340B2 (en)2004-08-022013-10-08Cisco Technology, Inc.Method and apparatus for determining authentication capabilities
US20060026671A1 (en)2004-08-022006-02-02Darran PotterMethod and apparatus for determining authentication capabilities
US7194763B2 (en)2004-08-022007-03-20Cisco Technology, Inc.Method and apparatus for determining authentication capabilities
US20070118883A1 (en)2004-08-022007-05-24Darran PotterMethod and apparatus for determining authentication capabilities
US20060064582A1 (en)2004-09-132006-03-23Coretrace CorporationMethod and system for license management
US20060149580A1 (en)2004-09-172006-07-06David HelsperFraud risk advisor
US20070038568A1 (en)2004-09-172007-02-15Todd GreeneFraud analyst smart cookie
US20060101136A1 (en)2004-09-302006-05-11Felica Networks, Inc.Information management apparatus, information management method, and program
US20060177061A1 (en)2004-10-252006-08-10Orsini Rick LSecure data parser method and system
US20080049983A1 (en)2004-11-162008-02-28Imageware Systems, Inc.Multimodal biometric platform
US20060161672A1 (en)2004-11-222006-07-20Bea Systems, Inc.System and method for improved interportlet communications
JP2006144421A (en)2004-11-222006-06-08Railway Technical Res Inst Authentication system
US20060161435A1 (en)2004-12-072006-07-20Farsheed AtefSystem and method for identity verification and management
US20110167154A1 (en)2004-12-072011-07-07Pure Networks, Inc.Network management
US20090328197A1 (en)2004-12-162009-12-31Mark Dwight NewellUser validation using images
US8060922B2 (en)2004-12-202011-11-15Emc CorporationConsumer internet authentication device
US20060195689A1 (en)2005-02-282006-08-31Carsten BleckenAuthenticated and confidential communication between software components executing in un-trusted environments
US20060213978A1 (en)2005-03-252006-09-28Bluko Information GroupMethod and system of advancing value from credit card account for use with stored value account
US20060282670A1 (en)2005-06-082006-12-14International Business Machines CorporationRelying party trust anchor based public key technology framework
TW200701120A (en)2005-06-242007-01-01Alfa Power Co LtdSafe trading system of automatic teller machine (atm) with integration of multimedia information
US20070005988A1 (en)2005-06-292007-01-04Microsoft CorporationMultimodal authentication
CN101495956A (en)2005-08-112009-07-29晟碟以色列有限公司Extended one-time password method and apparatus
WO2007023756A1 (en)2005-08-242007-03-01Nec CorporationIdentify authenticating system, user terminal, service provider apparatus, reliability assuring server, operating method of them and operating program of them
US20070101138A1 (en)2005-09-292007-05-03International Business Machines CorporationCryptographic methods, host system, trusted platform module, computer arrangement, computer program product and computer program
US20070077915A1 (en)2005-09-302007-04-05Black Greg RMethod and apparatus for module authentication
US20070087756A1 (en)2005-10-042007-04-19Hoffberg Steven MMultifactorial optimization system and method
US20070107048A1 (en)2005-10-112007-05-10David HallsSystems and Methods for Facilitating Distributed Authentication
US20070094165A1 (en)2005-10-262007-04-26Motorola, Inc.Path determination facilitation method
US20070100756A1 (en)2005-10-282007-05-03Microsoft CorporationSecure storage
US20070106895A1 (en)2005-11-042007-05-10Kung-Shiuh HuangBiometric non-repudiation network security systems and methods
US8458465B1 (en)2005-11-162013-06-04AT&T Intellectual Property II, L. P.Biometric authentication
US9317705B2 (en)2005-11-182016-04-19Security First Corp.Secure data parser method and system
JP2007148470A (en)2005-11-242007-06-14Hitachi Ltd Processing device, auxiliary information generation device, terminal device, authentication device, and biometric authentication system
US20070165625A1 (en)2005-12-012007-07-19Firestar Software, Inc.System and method for exchanging information among exchange applications
US20080005562A1 (en)2005-12-132008-01-03Microsoft CorporationPublic key infrastructure certificate entrustment
US20070278291A1 (en)2005-12-222007-12-06Rans Jean-Paul EMethods and Systems for Two-Factor Authentication Using Contactless Chip Cards or Devices and Mobile Devices or Dedicated Personal Readers
US20070168677A1 (en)2005-12-272007-07-19International Business Machines CorporationChanging user authentication method by timer and the user context
US20070169182A1 (en)2006-01-132007-07-19Wolfond Gregory HMulti-mode credential authorization
JP2007220075A (en)2006-01-192007-08-30Toshiba Corp Personal authentication device, position information transmission device, personal authentication system, personal authentication method, and personal authentication program
US20070198435A1 (en)2006-02-062007-08-23Jon SiegalMethod and system for providing online authentication utilizing biometric data
WO2007094165A1 (en)2006-02-152007-08-23Nec CorporationId system and program, and id method
US20100287369A1 (en)2006-02-152010-11-11Nec CorporationId system and program, and id method
US20100107222A1 (en)2006-03-022010-04-29Avery GlasserMethod and apparatus for implementing secure and adaptive proxies
JP2007249726A (en)2006-03-172007-09-27Hitachi Software Eng Co LtdAuthentication system
US20070217590A1 (en)2006-03-172007-09-20David LoupiaApparatus and System for Representation of Voices of Participants to a Conference Call
US20080028453A1 (en)2006-03-302008-01-31Thinh NguyenIdentity and access management framework
US20070239980A1 (en)2006-04-102007-10-11Fujitsu LimitedAuthentication method, authentication apparatus and authentication program storage medium
US20100223663A1 (en)2006-04-212010-09-02Mitsubishi Electric CorporationAuthenticating server device, terminal device, authenticating system and authenticating method
US20070288380A1 (en)2006-04-282007-12-13Ed StarrsMethod and apparatus for online check processing
US20120204032A1 (en)2006-05-092012-08-09Syncup CorporationEncryption key exchange system and method
US20080184351A1 (en)2006-05-162008-07-31Transactionsecure, LlcSystem and method for authenticating a person's identity using a trusted entity
US20070286130A1 (en)2006-06-122007-12-13Huai-Rong ShaoSystem and method for wireless communication of uncompressed video having a link control and bandwidth reservation scheme for control/management message exchanges and asynchronous traffic
US8489506B2 (en)2006-06-192013-07-16Visa U.S.A. Inc.Portable consumer device verification system
JP2010505286A (en)2006-06-272010-02-18マイクロソフト コーポレーション Biometric certificate validation framework
US20100242102A1 (en)2006-06-272010-09-23Microsoft CorporationBiometric credential verification framework
US7512567B2 (en)2006-06-292009-03-31Yt Acquisition CorporationMethod and system for providing biometric authentication at a point-of-sale via a mobile device
JP2008017301A (en)2006-07-072008-01-24Ntt Docomo Inc Near field communication terminal and security level setting method
US20090116651A1 (en)2006-07-122009-05-07Huawei Technologies Co., Ltd.Method and system for generating and distributing mobile ip key
US20080024302A1 (en)2006-07-262008-01-31Nec CorporationAsset management system, asset management method, information processor, management device, and program
US20080025234A1 (en)*2006-07-262008-01-31Qi ZhuSystem and method of managing a computer network using hierarchical layer information
US20080034207A1 (en)2006-08-012008-02-07Cisco Technology, Inc.Method and apparatus for selecting an appropriate authentication method on a client
US20080046984A1 (en)2006-08-172008-02-21Iana Livia BohmerFederated credentialing system and method
US20090271635A1 (en)2006-08-182009-10-29Huawei Technologies Co., Ltd.Methods and systems for authentication
US20090271618A1 (en)2006-08-312009-10-29International Business Machines CorporationAttestation of computing platforms
US20080086759A1 (en)2006-10-102008-04-10Colson Christen JVerification and authentication systems and methods
US20090064292A1 (en)2006-10-192009-03-05Carter Stephen RTrusted platform module (tpm) assisted data center management
US20110280402A1 (en)2006-11-302011-11-17Ibrahim Wael MMethods and systems for utilizing cryptographic functions of a cryptographic co-processor
US20080134311A1 (en)2006-12-012008-06-05Microsoft CorporationAuthentication delegation based on re-verification of cryptographic evidence
US20080141339A1 (en)2006-12-112008-06-12Sap AgMethod and system for authentication
US20080189212A1 (en)2006-12-212008-08-07Michael KulakowskiElectronic secure authentication for exchange buyer assurance system (eSafeBay)
US20080172725A1 (en)2007-01-162008-07-17Yoshihiro FujiiSystem, apparatus, and program for biometric authentication
US20080209545A1 (en)2007-01-242008-08-28Tomoyuki AsanoAuthentication System, Information Processing Apparatus and Method, Program, and Recording Medium
US20080232565A1 (en)2007-02-272008-09-25Andres KuttCommunications system
US20080235801A1 (en)2007-03-202008-09-25Microsoft CorporationCombining assessment models and client targeting to identify network security vulnerabilities
US20080313719A1 (en)2007-03-232008-12-18Kaliski Jr Burton SMethods and Apparatus for Delegated Authentication
US20100299265A1 (en)2007-04-172010-11-25Hypercom CorporationMethods and systems for security authentication and key exchange
US20080271150A1 (en)2007-04-302008-10-30Paul BoergerSecurity based on network environment
US20090025084A1 (en)2007-05-112009-01-22Fraud Management Technologies Pty LtdFraud detection filter
US20080289019A1 (en)2007-05-152008-11-20Oracle International CorporationFramework for automated dissemination of security metadata for distributed trust establishment
US20080289020A1 (en)2007-05-152008-11-20Microsoft CorporationIdentity Tokens Using Biometric Representations
US8359045B1 (en)2007-05-312013-01-22United Services Automobile Association (Usaa)Method and system for wireless device communication
US20100070424A1 (en)2007-06-042010-03-18Monk Justin TSystem, apparatus and methods for comparing fraud parameters for application during prepaid card enrollment and transactions
US20130167196A1 (en)2007-06-062013-06-27Boldstreet Inc.System and method for remote device recognition at public hotspots
US20080320308A1 (en)2007-06-202008-12-25Nokia CorporationMethod for remote message attestation in a communication system
US20090049510A1 (en)2007-08-152009-02-19Samsung Electronics Co., Ltd.Securing stored content for trusted hosts and safe computing environments
US20090055322A1 (en)2007-08-232009-02-26Microsoft CorporationRemovable module in personal handheld devices for personal information exchange
US20090083850A1 (en)2007-09-242009-03-26Apple Inc.Embedded authentication systems in an electronic device
US20110004918A1 (en)2007-09-282011-01-06Alcatel-LucentFacilitating heterogeneous authentication for allowing network access
US20090089870A1 (en)2007-09-282009-04-02Mark Frederick WahlSystem and method for validating interactions in an identity metasystem
JP2008065844A (en)2007-10-102008-03-21Quality KkInformation processing system
US20090100269A1 (en)2007-10-122009-04-16Compagnie Industrielle Et Financiere D'ingenierie "Ingenico"Biometric authentication method, computer program, authentication server, corresponding terminal and portable object
US20090204964A1 (en)2007-10-122009-08-13Foley Peter FDistributed trusted virtualization platform
US20100266128A1 (en)2007-10-162010-10-21Nokia CorporationCredential provisioning
US8185457B1 (en)2007-10-252012-05-22United Services Automobile Association (Usaa)Transaction risk analyzer
US20090119221A1 (en)2007-11-052009-05-07Timothy Martin WestonSystem and Method for Cryptographically Authenticated Display Prompt Control for Multifunctional Payment Terminals
US20130061055A1 (en)2007-11-082013-03-07SurlDx, Inc.Apparatus and Methods for Providing Scalable, Dynamic, Individualized Credential Services Using Mobile Telephones
US20090133113A1 (en)2007-11-152009-05-21Schneider James PAdding client authentication to networked communications
US8978117B2 (en)2007-11-192015-03-10Avaya Inc.Authentication frequency and challenge type based on environmental and physiological properties
US20090138724A1 (en)2007-11-262009-05-28Industrial Technology Research InstituteBiometric method and apparatus and biometric data encryption method thereof
US20090138727A1 (en)2007-11-282009-05-28Hitachi Global Storage Technologies Netherlands B.V.Challenge And Response Access Control Providing Data Security In Data Storage Devices
US20100094681A1 (en)2007-12-052010-04-15Almen Kevin DSystem and Method for Electronically Assisting a Customer at a Product Retail Location
US20110313872A1 (en)2007-12-142011-12-22Bank Of America CorporationInformation banking
US20090158425A1 (en)2007-12-182009-06-18Oracle International CorporationUser definable policy for graduated authentication based on the partial orderings of principals
US20090164797A1 (en)2007-12-212009-06-25Upek, Inc.Secure off-chip processing such as for biometric data
US20090187988A1 (en)2008-01-182009-07-23Microsoft CorporationCross-network reputation for online services
US20090193508A1 (en)2008-01-292009-07-30International Business Machines CorporationMethods, devices, and computer program products for discovering authentication servers and establishing trust relationships therewith
US20090199264A1 (en)2008-01-312009-08-06Intuit Inc.Dynamic trust model for authenticating a user
US20090196418A1 (en)2008-02-042009-08-06Freescale Semiconductor, Inc.Encryption Apparatus with Diverse Key Retention Schemes
US20110071841A1 (en)2008-02-152011-03-24Ddn Ip Holdings LimitedDistribution of digital content
US8353016B1 (en)2008-02-292013-01-08Adobe Systems IncorporatedSecure portable store for security skins and authentication information
US20130125197A1 (en)2008-02-292013-05-16James D. PravetzRelying Party Specifiable Format for Assertion Provider Token
US20090235339A1 (en)2008-03-112009-09-17Vasco Data Security, Inc.Strong authentication token generating one-time passwords and signatures upon server credential verification
JP2009223452A (en)2008-03-142009-10-01Hitachi LtdAuthentication system, and authentication server device and user device and application server device
US20090240624A1 (en)2008-03-202009-09-24Modasolutions CorporationRisk detection and assessment of cash payment for electronic purchase transactions
US20090245507A1 (en)2008-03-212009-10-01Renesas Technology Corp.Data processing system and data processing method
US20090327131A1 (en)2008-04-292009-12-31American Express Travel Related Services Company, Inc.Dynamic account authentication using a mobile device
US20090300714A1 (en)2008-05-272009-12-03Open Invention Network LlcPrivacy engine and method of use in a user-centric identity management system
US20090300720A1 (en)2008-05-302009-12-03Microsoft CorporationCentralized account reputation
US20090307139A1 (en)2008-06-062009-12-10Ebay, Inc.Biometric authentication of mobile financial transactions by trusted service managers
US20110093942A1 (en)2008-06-202011-04-21Koninklijke Philips Electronics N.V.Improved biometric authentication and identification
CN102077546A (en)2008-06-252011-05-25微软公司Remote access between UPnP devices
WO2009158530A2 (en)2008-06-252009-12-30Microsoft CorporationRemote access between upnp devices
JP2010015263A (en)2008-07-012010-01-21Kddi CorpMutual authentication system, mutual authentication method, and program
US20100010932A1 (en)2008-07-092010-01-14Simon LawSecure wireless deposit system and method
US20100023454A1 (en)2008-07-282010-01-28International Business Machines CorporationTransaction Authorization
US20100029300A1 (en)2008-07-302010-02-04Arima Communications Corp.Method for inquiring real-time travel-related information using a mobile communication device
US20100042848A1 (en)2008-08-132010-02-18Plantronics, Inc.Personalized I/O Device as Trusted Data Source
US20130125222A1 (en)2008-08-192013-05-16James D. PravetzSystem and Method for Vetting Service Providers Within a Secure User Interface
US20130124285A1 (en)2008-08-202013-05-16James D. PravetzSystem and Method for Trusted Embedded User Interface for Secure Payments
US20100062744A1 (en)2008-09-082010-03-11Ibrahim Wael MRetrieving data wirelessly from a mobile device
US20100083000A1 (en)2008-09-162010-04-01Validity Sensors, Inc.Fingerprint Sensor Device and System with Verification Token and Methods of Using
WO2010032216A1 (en)2008-09-192010-03-25Logomotion, S.R.O.The electronic payment application system and payment authorization method
US20100274677A1 (en)2008-09-192010-10-28Logomotion, S.R.O.Electronic payment application system and payment authorization method
JP2012503243A (en)2008-09-192012-02-02ロゴモーション エス.アール.オー. Electronic payment application system and payment authentication method
US20100082484A1 (en)2008-09-302010-04-01Avaya Inc.Proxy-Based, Transaction Authorization System
CN102187701A (en)2008-10-202011-09-14微软公司User authentication management
US20100105427A1 (en)2008-10-242010-04-29Shekhar GuptaTelecommunications system and method for monitoring the body temperature of a user
US20110265159A1 (en)2008-11-042011-10-27Troy Jacob RondaSystem and Methods for Online Authentication
CN101394283A (en)2008-11-042009-03-25西安西电捷通无线网络通信有限公司 A Trusted Platform Verification Method Based on Ternary Peer Authentication (TePA)
US20100114776A1 (en)2008-11-062010-05-06Kevin WellerOnline challenge-response
CN102246455A (en)2008-12-112011-11-16三菱电机株式会社Self-authentication communication equipment and equipment authentication system
EP2357754A1 (en)2008-12-112011-08-17Mitsubishi Electric CorporationSelf-authentication communication equipment and equipment authentication system
WO2010067433A1 (en)2008-12-112010-06-17三菱電機株式会社Self-authentication communication device, self-authentication verification communication device, device authentication system, device authentication method for device authentication system, self-authentication communication program, and self-authentication verification communication program
US8245030B2 (en)2008-12-192012-08-14Nai-Yu PaiMethod for authenticating online transactions using a browser
US20100169650A1 (en)2008-12-312010-07-01Brickell Ernest FStorage minimization technique for direct anonymous attestation keys
US8843997B1 (en)2009-01-022014-09-23Resilient Network Systems, Inc.Resilient trust network services
US20100175116A1 (en)2009-01-062010-07-08Qualcomm IncorporatedLocation-based system permissions and adjustments at an electronic device
US20100186072A1 (en)2009-01-212010-07-22Akshay KumarDistributed secure telework
US20100192209A1 (en)2009-01-232010-07-29Microsoft CorporationPassive security enforcement
US8284043B2 (en)2009-01-232012-10-09Honeywell International Inc.Method of formulating response to expired timer for data link message
US20100191612A1 (en)2009-01-282010-07-29Gregory G. RaleighVerifiable device assisted service usage monitoring with reporting, synchronization, and notification
US8516552B2 (en)2009-01-282013-08-20Headwater Partners I LlcVerifiable service policy implementation for intermediate networking devices
US20120066757A1 (en)2009-02-052012-03-15Wwpass CorporationAccessing data based on authenticated user, provider and system
US20100205658A1 (en)2009-02-122010-08-12International Business Machines CorporationSystem, method and program product for generating a cancelable biometric reference template on demand
US20100211792A1 (en)2009-02-172010-08-19Microsoft CorporationCommunication channel access based on channel identifier and use policy
US20110307949A1 (en)2009-02-192011-12-15Troy Jacob RondaSystem and methods for online authentication
US20100242088A1 (en)2009-03-172010-09-23Thomas Andrew JComputer security lock down methods
US8526607B2 (en)2009-03-202013-09-03Sichuan Changhong Electric Co., Ltd.Identity authentication and shared key generation method
US20110307706A1 (en)2009-03-252011-12-15Pacid Technologies, LlcMethod and system for securing communication
US8291468B1 (en)2009-03-302012-10-16Juniper Networks, Inc.Translating authorization information within computer networks
US20170331632A1 (en)2009-03-312017-11-16Topaz Systems, Inc.Distributed system for multi-function secure verifiable signer authentication
US20110099361A1 (en)2009-04-152011-04-28Interdigital Patent Holdings, Inc.Validation And/Or Authentication Of A Device For Communication With Network
US20120047555A1 (en)2009-04-282012-02-23China Iwncomm Co., Ltd.Platform authentication method suitable for trusted network connect architecture based on tri-element peer authentication
US20120018506A1 (en)2009-05-152012-01-26Visa Intrernational Service AssociationVerification of portable consumer device for 3-d secure services
US20100299738A1 (en)2009-05-192010-11-25Microsoft CorporationClaims-based authorization at an identity provider
US8745698B1 (en)2009-06-092014-06-03Bank Of America CorporationDynamic authentication engine
US20100325684A1 (en)2009-06-172010-12-23Microsoft CorporationRole-based security for messaging administration and management
US20100325427A1 (en)2009-06-222010-12-23Nokia CorporationMethod and apparatus for authenticating a mobile device
US20100325664A1 (en)2009-06-232010-12-23Samsung Electronics Co. Ltd.Method and apparatus for displaying electric program guide
US20100325711A1 (en)2009-06-232010-12-23Craig Stephen EtchegoyenSystem and Method for Content Delivery
US20120130898A1 (en)2009-07-072012-05-24Finsphere, Inc.Mobile directory number and email verification of financial transactions
US20110022835A1 (en)2009-07-272011-01-27Suridx, Inc.Secure Communication Using Asymmetric Cryptography and Light-Weight Certificates
US7865937B1 (en)2009-08-052011-01-04Daon Holdings LimitedMethods and systems for authenticating users
US20110047608A1 (en)2009-08-242011-02-24Richard LevenbergDynamic user authentication for access to online services
US20110078443A1 (en)2009-09-302011-03-31Greenstein Benjamin MMethod and system for secure communications on a managed network
US20120191979A1 (en)2009-10-012012-07-26Michael FeldbauSystem and method for electronic signature via proxy
US20110083016A1 (en)2009-10-062011-04-07Validity Sensors, Inc.Secure User Authentication Using Biometric Information
US20110138450A1 (en)2009-10-062011-06-09Validity Sensors, Inc.Secure Transaction Systems and Methods using User Authenticating Biometric Information
US20110082801A1 (en)2009-10-062011-04-07Validity Sensors, Inc.Secure Transaction Systems and Methods
US20120124651A1 (en)2009-11-022012-05-17Authentify, Inc.Secure and efficient authentication using plug-in hardware compatible with desktops, laptops and/or smart mobile communication devices such as iphones
US20110167472A1 (en)2009-11-022011-07-07International Business Machines CorporationEndpoint-Hosted Hypervisor Management
US20110107087A1 (en)2009-11-042011-05-05Samsung Electronics Co. Ltd.Apparatus and method for refreshing master session key in wireless communication system
US20110157346A1 (en)2009-11-112011-06-30Grzegorz ZyzdrynApparatus and method for determining sequencing of fingers in images to a two-finger scanner of fingerprint images
TW201121280A (en)2009-12-102011-06-16Mao-Cong LinNetwork security verification method and device and handheld electronic device verification method.
US8949978B1 (en)2010-01-062015-02-03Trend Micro Inc.Efficient web threat protection
CN102713922A (en)2010-01-122012-10-03维萨国际服务协会 Anytime confirmation of the verification token
US20120023568A1 (en)2010-01-222012-01-26Interdigital Patent Holdings, Inc.Method and Apparatus for Trusted Federated Identity Management and Data Access Authorization
CN102763111A (en)2010-01-222012-10-31交互数字专利控股公司Method and apparatus for trusted federated identity management and data access authorization
US20110184838A1 (en)2010-01-262011-07-28Michelle WintersTransaction data repository for risk analysis
US20110191200A1 (en)2010-02-042011-08-04Lex BayerMethod and system for authenticating online transactions
US20110197267A1 (en)2010-02-052011-08-11Vivianne GravelSecure authentication system and method
US20130212637A1 (en)2010-03-022013-08-15Interdigital Patent Holdings, Inc.Migration of credentials and/or domains between trusted hardware subscription modules
US20110219427A1 (en)2010-03-042011-09-08RSSBus, Inc.Smart Device User Authentication
US20130046991A1 (en)2010-03-082013-02-21Gemalto SaSystem and method for using a portable security device to cryptograhically sign a document in response to signature requests from a relying pary to a digital signature
US20110225431A1 (en)2010-03-102011-09-15Dell Products L.P.System and Method for General Purpose Encryption of Data
US20110225643A1 (en)2010-03-122011-09-15Igor FaynbergSecure dynamic authority delegation
JP2013522722A (en)2010-03-122013-06-13アルカテル−ルーセント Secure dynamic privilege delegation
US9032485B2 (en)2010-03-182015-05-12Zte CorporationAnchor authenticator relocation method and system
US20110228330A1 (en)2010-03-182011-09-22Brother Kogyo Kabushiki KaishaWireless Communication System
US8607048B2 (en)2010-03-182013-12-10Brother Kogyo Kabushiki KaishaWireless communication system
US20110231911A1 (en)2010-03-222011-09-22Conor Robert WhiteMethods and systems for authenticating users
US9171306B1 (en)2010-03-292015-10-27Bank Of America CorporationRisk-based transaction authentication
US8412928B1 (en)2010-03-312013-04-02Emc CorporationOne-time password authentication employing local testing of candidate passwords from one-time password server
US20110246766A1 (en)2010-03-312011-10-06Security First Corp.Systems and methods for securing data in motion
US20120030083A1 (en)2010-04-122012-02-02Jim NewmanSystem and method for evaluating risk in fraud prevention
US8719905B2 (en)2010-04-262014-05-06Authentify Inc.Secure and efficient login and transaction authentication using IPhones™ and other smart mobile communication devices
US20150381580A1 (en)2010-04-302015-12-31Donald Houston Graham, IIISystem and method to use a cloud-based platform supported by an api to authenticate remote users and to provide pki- and pmi- based distributed locking of content and distributed unlocking of protected content
US20110279228A1 (en)2010-05-122011-11-17Weyond Conferencing LLCSystem and Method for Remote Test Administration and Monitoring
US20110296518A1 (en)2010-05-282011-12-01Igor FaynbergApplication layer authentication in packet networks
US20110314549A1 (en)2010-06-162011-12-22Fujitsu LimitedMethod and apparatus for periodic context-aware authentication
US20110320823A1 (en)2010-06-252011-12-29Microsoft CorporationTrusted sensors
US20130104190A1 (en)*2010-07-082013-04-25Steven J. SimskeSystem and method for document policy enforcement
US20140325239A1 (en)2010-07-152014-10-30The Research Foundation For The State University Of New YorkSystem and method for validating program execution at run-time using control flow signatures
US20120023567A1 (en)2010-07-162012-01-26Ayman HammadToken validation for advanced authorization
US20120046012A1 (en)2010-08-172012-02-23Qualcomm IncorporatedMobile Device Having Increased Security That Is Less Obtrusive
US20130160083A1 (en)2010-08-232013-06-203M Innovative Properties CompanyMethod and device for challenge-response authentication
US20140040987A1 (en)2010-09-132014-02-06Zynga Inc.Network Application Security Utilizing Network-Provided Identities
US20120075062A1 (en)2010-09-282012-03-29Steven OsmanMethod and system for access to secure resources
US20120084566A1 (en)2010-10-042012-04-05Edward ChinMethods and systems for providing and controlling cryptographic secure communications across unsecured networks
US20120102553A1 (en)2010-10-222012-04-26Microsoft CorporationMixed-Mode Authentication
US20120124639A1 (en)2010-11-122012-05-17Shaikh Riaz AhmedValidation of consistency and completeness of access control policy sets
US20160036588A1 (en)2010-11-232016-02-04Concierge Holdings, Inc.System and method for verifying user identity in a virtual environment
US20140068746A1 (en)2010-11-242014-03-06Diego González MartínezMethod for authorizing access to protected content
US20170085587A1 (en)2010-11-292017-03-23Biocatch Ltd.Device, method, and system of generating fraud-alerts for cyber-attacks
US20120137137A1 (en)2010-11-302012-05-31Brickell Ernest FMethod and apparatus for key provisioning of hardware devices
US20120144461A1 (en)2010-12-072012-06-07Verizon Patent And Licensing Inc.Mobile pin pad
US20120159577A1 (en)2010-12-162012-06-21Microsoft CorporationAnonymous principals for policy languages
US20120203906A1 (en)*2011-02-082012-08-09AventuraHQ, Inc.Pre-Access Location-Based Rule Initiation in a Virtual Computing Environment
US20120210135A1 (en)2011-02-162012-08-16Santosh Kumar PanchapakesanClient-based authentication
US20130013931A1 (en)2011-03-072013-01-10Security First Corp.Secure file sharing method and system
US20120239950A1 (en)2011-03-152012-09-20Lenovo (Singapore) Pte, Ltd.Apparatus and Method for Variable Authentication Requirements
US20130144785A1 (en)2011-03-292013-06-06Igor KarpenkoSocial network payment authentication apparatuses, methods and systems
US20120249298A1 (en)2011-03-292012-10-04Nokia CorporationMethod and apparatus for providing biometric authentication using distributed computations
US20130054336A1 (en)2011-04-052013-02-28Roam Data IncSystem and method for incorporating one-time tokens, coupons, and reward systems into merchant point of sale checkout systems
US20140282965A1 (en)2011-04-112014-09-18NSS Lab Works LLCOngoing Authentication and Access Control with Network Access Device
US8584224B1 (en)2011-04-132013-11-12Symantec CorporationTicket based strong authentication with web service
US8713325B2 (en)2011-04-192014-04-29Authentify Inc.Key management using quasi out of band authentication architecture
US20120272056A1 (en)2011-04-192012-10-25Hawk And Seal, Inc.Key management using quasi out of band authentication architecture
US20120278873A1 (en)2011-04-292012-11-01William CaleroTechniques for resource operation based on usage, sharing, and recommendations with modular authentication
US20160078869A1 (en)2011-05-052016-03-17At&T Intellectual Property I, L.P.System and method for dynamic facial features for speaker recognition
US20140188770A1 (en)2011-05-102014-07-03Foteini AgrafiotiSystem and method for enabling continuous or instantaneous identity recognition based on physiological biometric signals
US20120291114A1 (en)2011-05-132012-11-15Cch IncorporatedSingle sign-on between applications
US8561152B2 (en)2011-05-172013-10-15Microsoft CorporationTarget-based access check independent of access request
US20130046976A1 (en)2011-06-032013-02-21Certicom Corp.System and Method for Accessing Private Networks
US20120317297A1 (en)2011-06-072012-12-13Microsoft CorporationEstablishment of a pairing relationship between two or more communication devices
US20120313746A1 (en)2011-06-102012-12-13AliphcomDevice control using sensory input
US20120323717A1 (en)2011-06-162012-12-20OneID, Inc.Method and system for determining authentication levels in transactions
US20170221068A1 (en)2011-06-302017-08-03Cable Television Laboratories, Inc.Personal authentication
JP2013016070A (en)2011-07-052013-01-24Interman CorpLogon support system
US20160134421A1 (en)2011-07-292016-05-12Hewlett Packard Enterprise Development LpCredential validation
US20130042115A1 (en)2011-08-092013-02-14CloudPassage, Inc.Systems and methods for implementing security in a cloud computing environment
US20130042327A1 (en)2011-08-122013-02-14Palo Alto Research Center IncorporatedGuided implicit authentication
US20130047200A1 (en)2011-08-152013-02-21Bank Of America CorporationApparatus and Method for Performing Data Tokenization
US20130055370A1 (en)2011-08-242013-02-28International Business Machines CorporationSecurity for future log-on location
US20130054967A1 (en)2011-08-302013-02-28Comcast Cable Communications, LlcReoccuring Keying System
US20130067546A1 (en)2011-09-082013-03-14International Business Machines CorporationTransaction authentication management system with multiple authentication levels
US20130073859A1 (en)2011-09-212013-03-21Visa International Service AssociationSystems and methods to secure user identification
US20130133054A1 (en)2011-09-242013-05-23Marc E. DavisRelationship Based Trust Verification Schema
US20130159413A1 (en)2011-09-242013-06-20Elwha LLC, a limited liability corporation of the State of DelawareBehavioral fingerprinting with social networking
US20130086669A1 (en)2011-09-292013-04-04Oracle International CorporationMobile application, single sign-on management
US20130090939A1 (en)*2011-10-112013-04-11Robert N. RobinsonSytem and method for preventing healthcare fraud
US20140033271A1 (en)2011-10-112014-01-30Citrix Systems, Inc.Policy-Based Application Management
US20130097682A1 (en)2011-10-132013-04-18Ilija ZeljkovicAuthentication Techniques Utilizing a Computing Device
US20130104187A1 (en)2011-10-182013-04-25Klaus Helmut WeidnerContext-dependent authentication
US20140189807A1 (en)2011-10-182014-07-03Conor P. CahillMethods, systems and apparatus to facilitate client-based authentication
CN103999401A (en)2011-10-182014-08-20英特尔公司Methods, systems and apparatus to facilitate client-based authentication
US20140245391A1 (en)2011-10-312014-08-28Money And Data Protection Lizenz Gmbh & Co. KgAuthentication Method
US20130124422A1 (en)2011-11-102013-05-16Intryca Inc.Systems and methods for authorizing transactions via a digital device
US20130119130A1 (en)2011-11-142013-05-16Vasco Data Security, Inc.Smart card reader with a secure logging feature
US20130133049A1 (en)2011-11-222013-05-23Michael PeirceMethods and systems for determining biometric data for use in authentication transactions
WO2013082190A1 (en)2011-11-282013-06-06Visa International Service AssociationTransaction security graduated seasoning and risk shifting apparatuses, methods and systems
JP2013122736A (en)2011-12-122013-06-20Tohsho CorpPoint management system
US20130160100A1 (en)2011-12-162013-06-20Richard Jay LangleyMethods and systems for increasing the security of network-based transactions
US8958599B1 (en)2012-01-062015-02-17Google Inc.Input method and system based on ambient glints
US20130219456A1 (en)2012-01-062013-08-22Rahul SharmaSecure Virtual File Management System
US20140089243A1 (en)2012-01-082014-03-27Steven Charles OppenheimerSystem and Method For Item Self-Assessment As Being Extant or Displaced
US20130191884A1 (en)2012-01-202013-07-25Interdigital Patent Holdings, Inc.Identity management with local functionality
US20150019220A1 (en)2012-01-242015-01-15Auraya Pty LtdVoice authentication and speech recognition system and method
US20130227646A1 (en)2012-02-142013-08-29Apple Inc.Methods and apparatus for large scale distribution of electronic access clients
US20140164776A1 (en)2012-02-202014-06-12Lock Box Pty LtdCryptographic method and system
US9547760B2 (en)2012-02-242017-01-17Samsung Electronics Co., Ltd.Method and system for authenticating user of a mobile device via hybrid biometics information
US9367678B2 (en)2012-02-292016-06-14Red Hat, Inc.Password authentication
US20130239173A1 (en)2012-03-122013-09-12Stephen T. DispensaComputer program and method for administering secure transactions using secondary authentication
US20130246272A1 (en)*2012-03-122013-09-19OneID Inc.Secure mobile transactions
US20130262305A1 (en)2012-03-272013-10-03International Business Machines CorporationAuthentication for transactions using near field communication
US20130337777A1 (en)2012-03-282013-12-19Steven W. DeutschConditional limited service grant based on device verification
US20130282589A1 (en)2012-04-202013-10-24Conductiv Software, Inc.Multi-factor mobile transaction authentication
US8776180B2 (en)2012-05-012014-07-08Taasera, Inc.Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms
US20130308778A1 (en)2012-05-212013-11-21Klaus S. FosmarkSecure registration of a mobile device for use with a session
US9521548B2 (en)2012-05-212016-12-13Nexiden, Inc.Secure registration of a mobile device for use with a session
US20130318343A1 (en)2012-05-222013-11-28Cisco Technology, Inc.System and method for enabling unconfigured devices to join an autonomic network in a secure manner
US20130326215A1 (en)2012-06-052013-12-05Cleversafe, Inc.Establishing trust within a cloud computing system
US20140007215A1 (en)2012-06-152014-01-02Lockheed Martin CorporationMobile applications platform
US20130347064A1 (en)2012-06-152013-12-26Visa International Services AssociationMethod and apparatus for secure application execution
US20130346176A1 (en)2012-06-202013-12-26Zachery AlolabiSystem and method for payment incentivizing
US20140006776A1 (en)2012-06-292014-01-02Mark Scott-NashCertification of a virtual trusted platform module
US20140002238A1 (en)2012-07-022014-01-02Validity Sensors, Inc.Credential quality assessment engine systems and methods
US20140013422A1 (en)2012-07-032014-01-09Scott JanusContinuous Multi-factor Authentication
WO2014011997A1 (en)2012-07-132014-01-16Interdigital Patent Holdings, Inc.Methods and systems for authenticating a user of a wireless unit
US20140201809A1 (en)2012-07-132014-07-17Interdigital Patent Holdings, Inc.Characteristics of Security Associations
US20140037092A1 (en)2012-08-022014-02-06Gm Global Technology Operations, Inc.Method and system of reconstructing a secret code in a vehicle for performing secure operations
US20140044265A1 (en)2012-08-102014-02-13Cryptography Research, Inc.Secure feature and key management in integrated circuits
US20140047510A1 (en)2012-08-132014-02-13Wells Fargo, N.A.Wireless multi-factor authentication with captive portals
US20140066015A1 (en)2012-08-282014-03-06Selim AissiSecure device service enrollment
US20140075516A1 (en)2012-09-122014-03-13Michael ChermsideSystem and method for providing controlled application programming interface security
US20140090039A1 (en)2012-09-242014-03-27Plantronics, Inc.Secure System Access Using Mobile Biometric Devices
US20140090088A1 (en)2012-09-272014-03-27Microsoft CorporationFacilitating Claim Use by Service Providers
US20140096182A1 (en)2012-09-292014-04-03Ned M. SmithSystems and methods for distributed trust computing and key management
US20140101439A1 (en)2012-10-052014-04-10General Electric CompanySystems and methods for authentication between networked devices
US20140250523A1 (en)2012-10-112014-09-04Carnegie Mellon UniversityContinuous Authentication, and Methods, Systems, and Software Therefor
US20140109174A1 (en)2012-10-152014-04-17Citrix Systems, Inc.Providing Virtualized Private Network Tunnels
US20140115702A1 (en)2012-10-192014-04-24Xiaoning LiEncrypted data inspection in a network environment
US20140114857A1 (en)2012-10-232014-04-24Alfred William GriggsTransaction initiation determination system utilizing transaction data elements
US20140130127A1 (en)2012-11-072014-05-08Fmr LlcRisk Adjusted, Multifactor Authentication
US8584219B1 (en)2012-11-072013-11-12Fmr LlcRisk adjusted, multifactor authentication
US20140137191A1 (en)2012-11-142014-05-15Research In Motion LimitedMobile communications device providing heuristic security authentication features and related methods
US20140173754A1 (en)2012-12-182014-06-19Bank Of America CorporationIdentity Attribute Exchange and Validation Broker
CN103888252A (en)2012-12-192014-06-25深圳市华营数字商业有限公司UID, PID, and APPID-based control application access permission method
WO2014105994A2 (en)2012-12-282014-07-03Nok Nok Labs, Inc.Query system and method to determine authentication capabilities
US9306754B2 (en)2012-12-282016-04-05Nok Nok Labs, Inc.System and method for implementing transaction signing within an authentication framework
US20140189360A1 (en)*2012-12-282014-07-03Davit BaghdasaryanSystem and method for implementing transaction signing within an authentication framework
US20140189828A1 (en)*2012-12-282014-07-03Davit BaghdasaryanSystem and method for processing random challenges within an authentication framework
US9083689B2 (en)2012-12-282015-07-14Nok Nok Labs, Inc.System and method for implementing privacy classes within an authentication framework
US20140189350A1 (en)*2012-12-282014-07-03Davit BaghdasaryanSystem and method for efficiently enrolling, registering, and authenticating with multiple authentication devices
US20140189835A1 (en)2012-12-282014-07-03Pitney Bowes Inc.Systems and methods for efficient authentication of users
US20140189808A1 (en)2012-12-282014-07-03Lookout, Inc.Multi-factor authentication and comprehensive login system for client-server networks
US20140189791A1 (en)*2012-12-282014-07-03Rolf LindemannSystem and method for implementing privacy classes within an authentication framework
US9015482B2 (en)2012-12-282015-04-21Nok Nok Labs, Inc.System and method for efficiently enrolling, registering, and authenticating with multiple authentication devices
US20140189779A1 (en)*2012-12-282014-07-03Davit BaghdasaryanQuery system and method to determine authenticatin capabilities
US9172687B2 (en)2012-12-282015-10-27Nok Nok Labs, Inc.Query system and method to determine authentication capabilities
US9219732B2 (en)2012-12-282015-12-22Nok Nok Labs, Inc.System and method for processing random challenges within an authentication framework
US8856541B1 (en)2013-01-102014-10-07Google Inc.Liveness detection
CN103945374A (en)2013-01-182014-07-23深圳市华营数字商业有限公司Method of mobile terminal equipment and user authentication based on PKI technology
US20140230032A1 (en)2013-02-132014-08-14Daniel DuncanSystems and Methods for Identifying Biometric Information as Trusted and Authenticating Persons Using Trusted Biometric Information
US20140250011A1 (en)2013-03-012014-09-04Lance WeberAccount type detection for fraud risk
US20150326529A1 (en)2013-03-112015-11-12Hitachi Automotive Systems, Ltd.Gateway device, and service providing system
US20150134330A1 (en)2013-03-142015-05-14Intel CorporationVoice and/or facial recognition based service provision
US20140279516A1 (en)2013-03-142014-09-18Nicholas RellasAuthenticating a physical device
US20140304505A1 (en)2013-03-152014-10-09William Johnson DawsonAbstraction layer for default encryption with orthogonal encryption logic session object; and automated authentication, with a method for online litigation
US20140282945A1 (en)2013-03-152014-09-18Intel CorporationTechnologies for secure storage and use of biometric authentication information
US20140282868A1 (en)2013-03-152014-09-18Micah ShellerMethod And Apparatus To Effect Re-Authentication
US9633322B1 (en)2013-03-152017-04-25Consumerinfo.Com, Inc.Adjustment of knowledge-based authentication
US20140289833A1 (en)2013-03-222014-09-25Marc BricenoAdvanced authentication techniques and applications
US20140289821A1 (en)2013-03-222014-09-25Brendon J. WilsonSystem and method for location-based authentication
US20140289117A1 (en)2013-03-222014-09-25Davit BaghdasaryanSystem and method for user confirmation of online transactions
US20140289820A1 (en)2013-03-222014-09-25Rolf LindemannSystem and method for adaptive user authentication
US9396320B2 (en)2013-03-222016-07-19Nok Nok Labs, Inc.System and method for non-intrusive, privacy-preserving authentication
US20140289116A1 (en)2013-03-222014-09-25Igor PolivanyiSystem and method for performing authentication for a local transaction
US20140289834A1 (en)2013-03-222014-09-25Rolf LindemannSystem and method for eye tracking during authentication
US20160034892A1 (en)2013-04-152016-02-04Visa Europe LimitedMethod and system for transmitting credentials
US20160087957A1 (en)2013-04-262016-03-24Interdigital Patent Holdings, Inc.Multi-factor authentication to achieve required authentication assurance level
US20140333413A1 (en)2013-05-082014-11-13Eren KursunSystems And Methods For High Fidelity Multi-Modal Out-Of-Band Biometric Authentication
US20140335824A1 (en)2013-05-132014-11-13Dennis Thomas AbrahamSystem and Method for Data Verification Using a Smart Phone
US20140337948A1 (en)2013-05-132014-11-13Hoyos Labs Corp.System and method for determining liveness
US20150244525A1 (en)2013-05-302015-08-27CertiVox Ltd.Authentication
US8646060B1 (en)2013-07-302014-02-04Mourad Ben AyedMethod for adaptive authentication using a mobile device
US20150046340A1 (en)2013-08-062015-02-12James Dene DimmickVariable authentication process and system
US9161209B1 (en)2013-08-212015-10-13Sprint Communications Company L.P.Multi-step mobile device initiation with intermediate partial reset
US20150058931A1 (en)2013-08-232015-02-26Morphotrust Usa, LlcSystem and Method for Identity Management
US20150096002A1 (en)2013-09-302015-04-02Laird H. ShuartMethod of Criminal Profiling and Person Identification Using Cognitive/Behavioral Biometric Fingerprint Analysis
US20150095999A1 (en)2013-10-012015-04-02Kalman Csaba TothElectronic Identity and Credentialing System
US20150121068A1 (en)2013-10-292015-04-30Rolf LindemannApparatus and method for implementing composite authenticators
US20150142628A1 (en)2013-11-202015-05-21Bank Of America CorporationDetecting structured transactions
US20150180869A1 (en)2013-12-232015-06-25Samsung Electronics Company, Ltd.Cloud-based scalable authentication for electronic devices
US20150193781A1 (en)2014-01-072015-07-09Bank Of America CorporationKnowledge Based Verification of the Identity of a User
US20150242605A1 (en)2014-02-232015-08-27Qualcomm IncorporatedContinuous authentication with a mobile device
US9698976B1 (en)2014-02-242017-07-04Wickr Inc.Key management and dynamic perfect forward secrecy
WO2015130734A1 (en)2014-02-252015-09-03Uab Research FoundationTwo-factor authentication systems and methods
US20150244696A1 (en)2014-02-272015-08-27Veritrix, Inc.Methods of Authenticating Users to a Site
CN103793632A (en)2014-02-282014-05-14汕头大学Method and device for transferring access permission control service of digital content products
US20150269050A1 (en)2014-03-182015-09-24Microsoft CorporationUnsupervised anomaly detection for arbitrary time series
US20170109751A1 (en)2014-05-022017-04-20Nok Nok Labs, Inc.System and method for carrying strong authentication events over different channels
US20140258711A1 (en)2014-05-202014-09-11Airwatch LlcApplication Specific Certificate Management
US20150373039A1 (en)2014-06-232015-12-24Niara, Inc.Entity Group Behavior Profiling
US20160071105A1 (en)2014-09-082016-03-10Mastercard International IncorporatedSystems and methods for using social network data to determine payment fraud
US20160087952A1 (en)2014-09-232016-03-24Qualcomm IncorporatedScalable authentication process selection based upon sensor inputs
US20160292687A1 (en)2014-10-132016-10-06Empire Technology Development LlcVerification location determination for entity presence confirmation of online purchases
US20160188958A1 (en)2014-12-312016-06-30Morphotrust Usa, LlcDetecting Facial Liveliness
US20170011406A1 (en)2015-02-102017-01-12NXT-ID, Inc.Sound-Directed or Behavior-Directed Method and System for Authenticating a User and Executing a Transaction
US20170004487A1 (en)2015-07-012017-01-05Klarna AbMethod for using supervised model with physical store
US20170048070A1 (en)2015-08-102017-02-16Data I/O CorporationDevice birth certificate
US20170195121A1 (en)2015-12-312017-07-06Microsoft Technology Licensing, Llc.Token binding using trust module protected keys
US20170317833A1 (en)2016-04-302017-11-02Civic Technologies, Inc.Methods and apparatus for providing attestation of information using a centralized or distributed ledger
US20170330174A1 (en)2016-05-112017-11-16Nasdaq, Inc.Application framework using blockchain-based asset ownership
US20170330180A1 (en)2016-05-162017-11-16Coinplug, Inc.Method for using and revoking authentication information and blockchain-based server using the same
US20170352116A1 (en)2016-06-062017-12-07Chicago Mercantile Exchange Inc.Data payment and authentication via a shared data structure
WO2017219007A1 (en)2016-06-172017-12-21Weimer JonathanBlockchain systems and methods for user authentication
US20180039990A1 (en)2016-08-052018-02-08Nok Nok Labs, Inc.Authentication techniques including speech and/or lip movement analysis
US20180191501A1 (en)2016-12-312018-07-05Nok Nok Labs, Inc.System and method for sharing keys across authenticators
US20180191695A1 (en)2016-12-312018-07-05Nok Nok Labs, Inc.System and method for bootstrapping a user binding
US20190139005A1 (en)2017-11-072019-05-09Mastercard International IncoporatedAch transaction authentication systems and methods
US20190164156A1 (en)2017-11-272019-05-30Nok Nok Labs, Inc.Extending a secure key storage for transaction confirmation and cryptocurrency
US20190205885A1 (en)2017-12-282019-07-04Paypal, Inc.Machine learning engine for fraud detection following link selection
US20190222424A1 (en)2018-01-122019-07-18Nok Nok Labs, Inc.System and method for binding verifiable claims
US20190251234A1 (en)2018-02-142019-08-15American Express Travel Related Services Company, Inc.Authentication challenges based on fraud initiation requests

Non-Patent Citations (379)

* Cited by examiner, † Cited by third party
Title
"Analysis of Advertising Effectiveness with Eye Tracking" —Theuner et al, Department of Marketing, Ludwigshafen University, Aug. 2008 http://www.noldus.com/mb2008/individual_papers/FPS_eye_tracking/FPS_eye_tracking_Theuner.pdf.
"OpenID Connect Core 1.0—draft 17," Feb. 3, 2014, 70 pages.
Abate A., et al.,"2D and 3D face recognition: A survey", 2007, pp. 1885-1906.
Advisory Action from U.S. Appl. No. 13/730,791 dated Jan. 23, 2015, 4 pages.
Akhtar Z., et al., "Spoof Attacks on Multimodal Biometric Systems", International Conference on Information and Network Technology, 2011, vol. 4, pp. 46-51.
Babich A., "Biometric Authentication. Types of Biometric Identifiers," Haaga-Helia, University of Applied Sciences, 2012, retrieved from https://www.theseus.fi/bitstream/handle/10024/44684/Babich_Aleksandra.pdf, 56 pages.
Bao, W., et al., "A liveness detection method for face recognition based on optical flow field", 2009, pp. 233-236, http://ieexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5054589&isnumber=5054562.
Barker E., et al., "Recommendation for key management Part 3: Application—Specific Key Management Guidance", NIST Special Publication 800-57, 2009, pp. 1-103.
BehavioSec, "Measuring FAR/FRR/EER in Continuous Authentication," Stockholm, Sweden (2009), 8 pages.
Brickell, E., et al., Intel Corporation; Jan Camenish, IBM Research; Liqun Chen, HP Laboratories. "Direct Anonymous Attestation". Feb. 11, 2004, pp. 1-28 [online]. Retrieved from the Internet: URL:https://eprint.iacr.org/2004/205.pdf.
Chakka M., et al., "Competition on Counter Measures to 2-D Facial Spoofing Attacks". 6 pages .2011. http://www.csis.pace.edu/-ctappert/dps/IJCB2011/papers/130.pdf. 978-1-4577-1359-0/11.
Chen L., "Direct Anonymous Attestation," Oct. 12, 2005, retrieved from https://trustedcomputinggroup.org/wp-content/uploads/051012_DAA-slides.pdf on Apr. 2, 2018, 27 pages.
Chen L., et al., "Flexible and scalable digital signatures in TPM 2.0." Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, 2013, 12 pages.
Chetty G. School of ISE University of Canberra Australia. "Multilevel liveness verification for face-voice biometric authentication". BYSM-2006 Symposium. Baltimore: BYSM-Symposium 9 pages. Sep. 19, 2006. http://www.biometrics.org/bc2006/presentations/Tues_Sep_19/BSYM/19_Chetty_research.pdf.
Communication pursuant to Article 94(3) EPC for Application No. 15786796.1, dated Oct. 23, 2018, 4 pages.
Communication pursuant to Article 94(3) EPC for Application No. 15841530.7, dated Feb. 8, 2019, 4 pages.
Communication pursuant to Article 94(3) EPC, EP App. No. 13867269.6, dated Aug. 30, 2019, 6 pages.
Communication Pursuant to Article 94(3) EPC, EP App. No. 14770682.4, dated Jun. 6, 2019, 5 pages.
Communication pursuant to Article 94(3) EPC, EP App. No. 15786487.7, dated Feb. 20, 2020, 6 pages.
Communication pursuant to Article 94(3) EPC, EP App. No. 157867961, dated May 31, 2019, 5 pages.
Communication pursuant to Article 94(3) EPC, EP App. No. 158266601, dated Jul. 4, 2019, 6 pages.
Communication Pursuant to Article 94(3) EPC, EP App. No. 158273342, dated Apr. 30, 2019, 9 pages.
Communication Pursuant to Article 94(3) EPC, EP App. No. 15828152.7, dated Jan. 31, 2019, 7 pages.
Communication pursuant to Article 94(3) EPC, EP. App. No. 14803988.6, dated Oct. 25, 2019, 5 pages.
Communication pursuant to Rules 161(2) and 162 EPC for EP Application No. 15826364.0, dated Mar. 7, 2017, 2 pages.
Communication Pursuant to Rules 70(2) and 70a(2) EPC for European Application No. 15786487.7, dated Nov. 9, 2017, 1 page.
Communication Pursuant to Rules 70(2) and 70a(2) EPC for European Application No. 15827363.7, dated Mar. 13, 2018, 1 page.
Continuous User Authentication Using Temporal Information, http://www.cse.msu.edu/biometrics/Publications/Face/NiinumaJain_ContinuousAuth_SPIE10.pdf, 11 pages.
Corrected Notice of Allowability from U.S. Appl. No. 15/595,460, dated Nov. 20, 2018, 38 pages.
Corrected Notice of Allowance from U.S. Appl. No. 14/066,273, dated Feb. 8, 2018, 4 pages.
Corrected Notice of Allowance from U.S. Appl. No. 15/396,452, dated Aug. 30, 2018, 17 pages.
Corrected Notice of Allowance from U.S. Appl. No. 15/396,454, dated Sep. 28, 2018, 24 pages.
Corrected Notice of Allowance from U.S. Appl. No. 15/595,460, dated Dec. 11, 2018, 70 pages.
Corrected Notice of Allowance, U.S. Appl. No. 14/218,575, dated Jun. 24, 2019, 16 pages.
Crazy Egg Heatmap Shows Where People Click on Your Website, 2012, 3 pages, www.michaelhartzell.com/Blog/bid/92970/Crazy-Egg-Heatmap-shows-where-people-click-on-your-website).
Crowley et al., "Online Identity and Consumer Trust: Assessing Online Risk", Available Online at <https://www.brookings.eduiwp-content/uploads/2016/06/0111_online_identity_trust.pdf>, Jan. 11, 2011, 15 pages.
Dawei Zhang; Peng Hu, "Trusted e-commerce user agent based on USB Key", Proceedings of the International MultiConference of Engineers and Computer Scientists 2008 vol. I, IMECS 2008, Mar. 19-21, 2008, Hong Kong, 7 pages.
Decision of Final Rejection, JP App. No. 2016-566924, dated Feb. 27, 2020, 8 pages (5 pages of English Translation and 3 pages of Original Document).
Decision to Grant a Patent, JP App. No. 2016-516743 dated Jan. 10, 2019, 5 pages.
Decision to Grant from foreign counterpart Japanese Patent Application No. 2015-550778, dated Jul. 25, 2018, 6 pages.
Decision to Grant, JP App. No. 2016-566912, dated Dec. 26, 2019, 3 pages (2 pages of English Translation and 1 pages of Original Document).
Delac K. et al., Eds., Image Compression in Face Recognition-a Literature Survey, InTech, Jun. 1, 2008, ISBN 978-953-7619-34-3, Uploaded as individual Chapters 1-15, downloaded from https://www.intechopen.com/books/recent_advances_inface_recognition/image_compression_in_face_recognition_-_a_literature_survey, 15 pages.
Delac K. et al., Eds., InTech, Jun. 1, 2008, Retrieved from the Internet:, ISBN 978-953-7619-34-3, Uploaded as individual Chapters 1-15, 15 pages.
Doherty, et al., Internet Engineering Task Force (IETF), "Dynamic Symmetric Key Provisioning Protocol (DSKPP)", Dec. 2010, 105 pages.
Edited by Kresimir Delac, Mislay Grgic and Marian Stewart Bartlett. s.l. : InTech Jun. 1, 2008. http://cdn.intechopen.com/finals/81/InTech-Recent_advances_in_face_recognition.zip. ISBN 978-953-7619-34-3. Uploaded as Chapters 1-15.
Extended European Search Report for Application No. 13867269, dated Nov. 4, 2016, 10 pages.
Extended European Search Report for Application No. 14803988.6, dated Dec. 23, 2016, 10 pages.
Extended European Search Report for Application No. 15786487.7, dated Oct. 23, 2017, 8 pages.
Extended European Search Report for Application No. 15786796.1, dated Nov. 3, 2017, 9 pages.
Extended European Search Report for Application No. 15826364.0, dated Feb. 20, 2018, 6 pages.
Extended European Search Report for Application No. 15826660.1, dated Nov. 16, 2017, 9 pages.
Extended European Search Report for Application No. 15827334.2, dated Nov. 17, 2017, 8 pages.
Extended European Search Report for Application No. 15827363.1, dated Feb. 22, 2018, 7 pages.
Extended European Search Report for Application No. 15828152.7, dated Feb. 20, 2018, 8 pages.
Extended European Search Report for Application No. 15841530.7, dated Mar. 26, 2018, 8 pages.
Extended European Search Report from European Patent Application No. 14770682.4, dated Jan. 17, 2017, 14 pages.
Final Office Action from U.S. Appl. No. 13/730,761 dated Jan. 15, 2015, 31 pages.
Final Office Action from U.S. Appl. No. 13/730,761 dated Jul. 8, 2014, 36 pages.
Final Office Action from U.S. Appl. No. 13/730,776 dated Nov. 3, 2014, 20 pages.
Final Office Action from U.S. Appl. No. 13/730,780 dated Jan. 27, 2015, 30 pages.
Final Office Action from U.S. Appl. No. 13/730,780 dated May 12, 2014, 34 pages.
Final Office Action from U.S. Appl. No. 13/730,791 dated Nov. 13, 2014, 22 pages.
Final Office Action from U.S. Appl. No. 13/730,795 dated Aug. 14, 2014, 20 pages.
Final Office Action from U.S. Appl. No. 14/066,273 dated Feb. 11, 2016, 29 pages.
Final Office Action from U.S. Appl. No. 14/066,273 dated Jan. 10, 2017, 24 pages.
Final Office Action from U.S. Appl. No. 14/066,273, dated Sep. 8, 2017, 30 pages.
Final Office Action from U.S. Appl. No. 14/066,384 dated Aug. 20, 2015, 23 pages.
Final Office Action from U.S. Appl. No. 14/145,466, dated Apr. 13, 2017, 61 pages.
Final Office Action from U.S. Appl. No. 14/145,466, dated Nov. 20, 2018, 28 pages.
Final Office Action from U.S. Appl. No. 14/218,504, dated Sep. 12, 2017, 83 pages.
Final Office Action from U.S. Appl. No. 14/218,551 dated Sep. 16, 2016, 11 pages.
Final Office Action from U.S. Appl. No. 14/218,551 dated Sep. 9, 2015, 15 pages.
Final Office Action from U.S. Appl. No. 14/218,575 dated Aug. 7, 2015, 19 pages.
Final Office Action from U.S. Appl. No. 14/218,575 dated Jul. 7, 2016, 29 pages.
Final Office Action from U.S. Appl. No. 14/218,575 dated Sep. 5, 2018, 19 pages.
Final Office Action from U.S. Appl. No. 14/218,575, dated Jul. 31, 2017, 42 pages.
Final Office Action from U.S. Appl. No. 14/218,611, dated Jan. 27, 2017, 14 pages.
Final Office Action from U.S. Appl. No. 14/218,611, dated May 3, 2018, 20 pages.
Final Office Action from U.S. Appl. No. 14/218,677, dated May 31, 2018, 16 pages.
Final Office Action from U.S. Appl. No. 14/218,677, dated Sep. 28, 2017, 16 pages.
Final Office Action from U.S. Appl. No. 14/218,692 dated Mar. 2, 2016, 24 pages.
Final Office Action from U.S. Appl. No. 14/218,692, dated Apr. 17, 2018, 99 pages.
Final Office Action from U.S. Appl. No. 14/218,692, dated Feb. 28, 2017, 27 pages.
Final Office Action from U.S. Appl. No. 14/218,743, dated Feb. 7, 2018, 27 pages.
Final Office Action from U.S. Appl. No. 14/218,743, dated Mar. 3, 2017, 67 pages.
Final Office Action from U.S. Appl. No. 14/268,563, dated Dec. 27, 2018, 47 pages.
Final Office Action from U.S. Appl. No. 14/268,563, dated Nov. 3, 2017, 46 pages.
Final Office Action from U.S. Appl. No. 14/268,619 dated Dec. 14, 2015, 10 pages.
Final Office Action from U.S. Appl. No. 14/268,733 dated Jan. 15, 2016, 14 pages.
Final Office Action from U.S. Appl. No. 14/448,747, dated Feb. 13, 2017, 74 pages.
Final Office Action from U.S. Appl. No. 14/448,814 dated Feb. 16, 2016, 14 pages.
Final Office Action from U.S. Appl. No. 14/448,814 dated Jun. 14, 2016, 17 pages.
Final Office Action from U.S. Appl. No. 14/448,814 dated Oct. 6, 2017, 24 pages.
Final Office Action from U.S. Appl. No. 14/448,868 dated Aug. 19, 2016, 11 pages.
Final Office Action from U.S. Appl. No. 14/859,328, dated Mar. 6, 2017, 26 pages.
Final Office Action from U.S. Appl. No. 15/229,254, dated Aug. 23, 2018, 16 pages.
Final Office Action from U.S. Appl. No. 15/396,452, dated Feb. 27, 2018, 24 pages.
Final Office Action from U.S. Appl. No. 15/595,460, dated Jan. 11, 2018, 19 pages.
Final Office Action from U.S. Appl. No. 15/881,522, dated Feb. 6, 2019, 21 pages.
Final Office Action from U.S. Appl. No. 15/954,188, dated Feb. 25, 2019, 8 pages.
Final Office Action, U.S. Appl. No. 14/218,611, dated Aug. 2, 2019, 26 pages.
Final Office Action, U.S. Appl. No. 14/218,677, dated Jun. 10, 2019, 15 pages.
Final Office Action, U.S. Appl. No. 14/268,563, dated Nov. 8, 2019, 36 pages.
Final Office Action, U.S. Appl. No. 15/229,233, dated Sep. 24, 2019, 18 pages.
Final Office Action, U.S. Appl. No. 15/822,531, dated Apr. 7, 2020, 22 pages.
First Office Action and Search Report from foreign counterpart China Patent Application No. 201380068869.3, dated Sep. 19, 2017, 17 pages.
First Office Action and Search Report from foreign counterpart China Patent Application No. 201480025959.9, dated Jul. 7, 2017, 10 pages.
First Office Action and Search Report, CN App. No. 201580040813.6, dated Jun. 28, 2019, 19 pages.
First Office Action and Search Report, CN App. No. 201580040814, dated Jul. 10, 2019, 10 pages. (Translation available only for the office action).
First Office Action CN App. No. 201580040831.4, dated Mar. 3, 2020, 31 pages (18 pages of English Translation and 13 pages of Office Action).
First Office Action, CN App. No. 201580022332.2, dated Aug. 5, 2019, 14 pages (7 pages of English Translation and 7 pages of Original Document).
Fourth Office Action, CN App. No. 201480025959.9, dated Apr. 12, 2019, 10 pages.
Grother, P.J., et al., NIST. Report on the Evaluation of 2D Still-Image Face Recognition Algorithms, NIST IR 7709. s.l, NIST, 2011, Jun. 22, 2010, pp. 1-58.
GSM Arena. [Online] Nov. 13, 2011, [Cited: Sep. 29, 2012.], 2 pages, [retrieved on Aug. 18, 2015]. Retrieved from the Internet: URL: http://www.gsmarena.com/ice_cream_sandwichs_face_unlock_duped_using_a_photograph-news-3377.php.
Hebbes L, et al., "2-Factor Authentication with 2D Barcodes," Proceedings of the Fifth International Symposium on Human Aspects of Information Security & Assurance (Haisa 2011), 2011, pp. 86-96.
Heikkila M., et al., "A Texture-Based Method for Modeling the Background and Detecting Moving Objects", Oulu : IEEE , Jun. 22 2005, Draft, Retrieved from the Internet: URL: , 16 pages.
Hernandez, T., "But What Does It All Mean? Understanding Eye-Tracking Results (Part 3)", Sep. 4, 2007, 2 pages. EyeTools. Part III: What is a heatmap . . . really? [Online] [Cited: Nov. 1, 2012.] Retrieved from the Internet: URL:http://eyetools.com/articles/p3- understanding-eye-tracking-what-is-a-heatmap-really.
Himanshu, et al., "A Review of Face Recognition". International Journal of Research in Engineering & Applied Sciences. Feb. 2012, vol. 2, pp. 835-846. Retrieved from the Internet: URL:http://euroasiapub.org/IJREAS/Feb2012/81.pdf.
Huang L., et al., "Clickjacking: Attacks and Defenses". S.I. : Usenix Security 2012, pp. 1-16, 2012 [online]. Retrieved from the Internet: URL:https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-fina139.pdf.
IEEE P802.11ah/D5.0: "Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 2: Sub 1 GHz License Exempt Operation," IEEE Draft Standard for Information technology-Telecommunications and information exchange between systems, Local and metropolitan area networks-Specific requirements, Mar. 2015, 632 pages.
IEEE Std 802.11-2012: "Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications," IEEE Standard for Information technology-Telecommunicationsand information exchange between systems, Local and metropolitan area networks-Specific requirements, Mar. 29, 2012, 2793 pages.
IEEE Std 802.11ac-2013 "Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 4: Enhancements for Very High Throughput for Operation in Bands below 6 GHz," IEEE Standard for Information technology-Telecommunicationsand information exchange between systems, Local and metropolitan area networks-Specific requirements, Dec. 18, 2013, 425 pages.
Intention to Grant a Patent, EP App. No. 15826364.0, dated Feb. 18, 2020, 6 pages.
Intention to Grant under Rule 71(3) EPC, EP App. No. 15826660.1, dated Apr. 28, 2020, 6 pages.
Intention to Grant under Rule 71(3) EPC, EP App. No. 15828152.7, dated Apr. 1, 2020, 6 pages.
International Preliminary Report on Patentability for Application No. PCT/US2015/028924 dated Nov. 17, 2016, 9 pages.
International Preliminary Report on Patentability for Application No. PCT/US2015/028927 dated Nov. 17, 2016, 10 pages.
International Preliminary Report on Patentability for Application No. PCT/US2015/042786, dated Feb. 9, 2017, 7 pages.
International Preliminary Report on Patentability for Application No. PCT/US2015/042799, dated Feb. 9, 2017, 7 pages.
International Preliminary Report on Patentability for Application No. PCT/US2015/042870, dated Feb. 9, 2017, 8 pages.
International Preliminary Report on Patentability for Application No. PCT/US2015/050348, dated Mar. 30, 2017, 7 pages.
International Preliminary Report on Patentability for Application No. PCT/US2015/42783, dated Feb. 9, 2017, 12 pages.
International Preliminary Report on Patentability for Application No. PCT/US2015/42827, dated Feb. 9, 2017, 6 pages.
International Preliminary Report on Patentability for Application No. PCT/US2017/045534, dated Feb. 14, 2019, 11 pages.
International Search Report and Written Opinion for Application No. PCT/U52017/045534, dated Nov. 27, 2017, 14 pages.
International Search Report and Written Opinion for Application No. PCT/US2015/028924 dated Jul. 30, 2015, 10 pages.
International Search Report and Written Opinion for PCT Application No. PCT/US2018/062608, dated Mar. 28, 2019, 12 pages.
International Search Report and Written Opinion, PCT App. No. PCT/US2019/013199, dated Apr. 1, 2019, 12 pages.
Jafri R., et al. "A Survey of Face Recognition Techniques," Journal of Information Processing Systems, 2009, vol. 5 (2), pp. 41-68.
Julian J., et al., "Biometric Enabled Portable Trusted Computing Platform," Trust Security and Privacy in Computing and Communications (TRUSTCOM), 2011 IEEE 10th International Conference on Nov. 16, 2011, pp. 436-442, XP032086831, DOI:10.1109/TRUSTCOM.2011.56, ISBN: 978-1-4577-2135-9.
JULIAN JANG ; HON HWANG ; SURYA NEPAL: "Biometric Enabled Portable Trusted Computing Platform", TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2011 IEEE 10TH INTERNATIONAL CONFERENCE ON, IEEE, 16 November 2011 (2011-11-16), pages 436 - 442, XP032086831, ISBN: 978-1-4577-2135-9, DOI: 10.1109/TrustCom.2011.56
Kim et al., "Secure User Authentication based on the Trusted Platform for Mobile Devices," EURASIP Journal on Wireless Communications and Networking, pp. 1-15.
Kim H.C., et al., "A Design of One-Time Password Mechanism Using Public Key Infrastructure," Networked Computing and Advanced Information Management, 2008, NCM'08, 4th International Conference on IEEE, Sep. 2, 2008, pp. 18-24.
Kollreider K., et al., "Evaluating Liveness by Face Images and the Structure Tensor," Halmstad, Sweden: s.n., Halmstad University, SE-30118, Sweden, [online], 2005, Retrieved from the Internet: URL: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.62.6534&rep=rep1 &type=pdf, pp. 75-80.
Kollreider K., et al., "Non-Instrusive Liveness Detection by Face Images," Image and Vision Computing, 2007, vol. 27 (3), pp. 233-244.
Kong S., et al. "Recent Advances in Visual and Infrared Face Recognition: A Review," Journal of Computer Vision and Image Understanding, 2005, vol. 97 (1), pp. 103-135.
Li J., et al., "Live Face Detection Based on the Analysis of Fourier Spectra," Biometric Technology for Human Identification, 2004, pp. 296-303.
Lubin, G., et al., "16 Heatmaps That Reveal Exactly Where People Look," Business Insider, [online], May 21, 2012, [Cited: Nov. 1, 2012], Retrieved from the Internet: URL: http://www.businessinsider.com/eye-tracking-heatmaps-2012-5?pp=1, pp. 1-21.
Maatta J., et al., "Face Spoofing Detection From Single Images Using Micro-Texture Analysis," Machine Vision Group, University of Oulu, Finland, Oulu, IEEE, [online], 2011, Retrieved from the Internet: URL: http://www.ee.oulu.fi/research/mvmp/mvg/files/pdf/131.pdf., pp. 1-7.
Manabe et al., "Person Verification using Handwriting Gesture", Proceedings of the 26th Annual Conference of Japanese Society for Artifical Intelligence, 2012, 9 pages (English Abstract Submitted).
Marcialis G.L., et al. "First International Fingerprint Liveness Detection Competition-Livdet 2009," Image Analysis and Processing—ICIAP, Springer Berlin Heidelberg, 2009. pp. 12-23.
Martins R A., et al., "A Potpourri of Authentication Mechanisms the Mobile Device Way," CISTI, Jan. 2013, pp. 843-848.
Mobile Device Security Using Transient Authentication, IEEE Transactions on Mobile Computing, 2006, vol. 5 (11), pp. 1489-1502.
Monden A., et al., "Remote Authentication Protocol," Multimedia, Distributed, Cooperative and Mobile Symposium (DICOM02007), Information Processing Society of Japan, Jun. 29, 2007, pp. 1322-1331.
National Science & Technology Council's Subcommittee on Biometrics. Biometrics Glossary. 33 pages, Last updated Sep. 14, 2006. NTSC. http://www.biometrics.gov/documents/glossary.pdf.
Nielsen, Jakib. useit.com. Jakob Nielsen's Alertbox—Horizontal Attention Leans Left. [Online] Apr. 6, 2010. [Cited: Nov. 1, 2012.] 4 pages. http://www.useit.com/alertbox/horizontal-attention.html.
Nielsen, Jakob. useit.com. Jakob Nielsen's Alertbox—Scrolling and Attention. [Online] Mar. 22, 2010. [Cited: Nov. 1, 2012.] 6 pages. http://www.useit.com/alertbox/scrolling-attention.html.
Non-Final Office Action from U.S. Appl. No. 13/730,761 dated Feb. 27, 2014, 24 pages.
Non-Final Office Action from U.S. Appl. No. 13/730,761 dated Sep. 9, 2014, 36 pages.
Non-Final Office Action from U.S. Appl. No. 13/730,776 dated Jul. 15, 2014, 16 pages.
Non-Final Office Action from U.S. Appl. No. 13/730,780 dated Aug. 4, 2014, 30 pages.
Non-Final Office Action from U.S. Appl. No. 13/730,780 dated Mar. 12, 2014, 22 pages.
Non-Final Office Action from U.S. Appl. No. 13/730,791 dated Jun. 27, 2014, 17 pages.
Non-Final Office Action from U.S. Appl. No. 13/730,795 dated Jan. 5, 2015, 19 pages.
Non-Final Office Action from U.S. Appl. No. 13/730,795 dated Jun. 11, 2014, 14 pages.
Non-Final Office Action from U.S. Appl. No. 14/066,273 dated Jun. 16, 2016, 43 pages.
Non-Final Office Action from U.S. Appl. No. 14/066,273 dated May 18, 2017, 46 pages.
Non-Final Office Action from U.S. Appl. No. 14/066,273 dated May 8, 2015, 31 pages.
Non-Final Office Action from U.S. Appl. No. 14/066,384 dated Jan. 7, 2015, 24 pages.
Non-Final Office Action from U.S. Appl. No. 14/066,384 dated Mar. 17, 2016, 40 pages.
Non-Final Office Action from U.S. Appl. No. 14/145,439 dated Feb. 12, 2015, 18 pages.
Non-Final Office Action from U.S. Appl. No. 14/145,466 dated Sep. 9, 2016, 13 pages.
Non-Final Office Action from U.S. Appl. No. 14/145,466, dated May 11, 2018, 33 pages.
Non-Final Office Action from U.S. Appl. No. 14/145,533 dated Jan. 26, 2015, 13 pages.
Non-Final Office Action from U.S. Appl. No. 14/145,607 dated Mar. 20, 2015, 22 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,504, dated Feb. 27, 2017, 12 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,551 dated Apr. 23, 2015, 9 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,551 dated Jan. 21, 2016, 11 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,551 dated May 12, 2016, 11 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,575 dated Feb. 10, 2015, 17 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,575 dated Jan. 29, 2016, 25 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,575, dated Mar. 8, 2018, 29 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,575, dated May 4, 2017, 88 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,611 dated Jun. 16, 2016, 13 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,611, dated Feb. 7, 2019, 27 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,611, dated Sep. 19, 2017, 76 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,677 dated Aug. 2, 2016, 15 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,677, dated Dec. 26, 2018, 32 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,677, dated Feb. 10, 2017, 18 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,677, dated Feb. 2, 2018, 25 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,692 dated Nov. 4, 2015, 16 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,692 dated Oct. 25, 2016, 33 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,692, dated Jul. 31, 2018, 40 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,692, dated Sep. 19, 2017, 37 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,743 dated Aug. 19, 2016, 11 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,743 dated Jan. 21, 2016, 12 pages.
Non-Final Office Action from U.S. Appl. No. 14/218,743, dated Aug. 2, 2017, 24 pages.
Non-final Office Action from U.S. Appl. No. 14/268,563, dated Apr. 21, 2017, 83 pages.
Non-Final Office Action from U.S. Appl. No. 14/268,563, dated Jun. 28, 2018, 56 pages.
Non-Final Office Action from U.S. Appl. No. 14/268,563, dated May 13, 2019, 47 pages.
Non-Final Office Action from U.S. Appl. No. 14/268,619 dated Aug. 24, 2015, 17 pages.
Non-Final Office Action from U.S. Appl. No. 14/268,619 dated Mar. 21, 2016, 7 pages.
Non-Final Office Action from U.S. Appl. No. 14/268,733 dated Jul. 16, 2015, 13 pages.
Non-Final Office Action from U.S. Appl. No. 14/448,641 dated Nov. 9, 2015, 21 pages.
Non-Final Office Action from U.S. Appl. No. 14/448,747 dated Aug. 19, 2016, 21 pages.
Non-Final Office Action from U.S. Appl. No. 14/448,814 dated Aug. 4, 2015, 13 pages.
Non-Final Office Action from U.S. Appl. No. 14/448,814, dated Apr. 5, 2017, 57 pages.
Non-Final Office Action from U.S. Appl. No. 14/448,868 dated Dec. 31, 2015, 12 pages.
Non-Final Office Action from U.S. Appl. No. 14/487,992 dated Dec. 3, 2015, 15 pages.
Non-Final Office Action from U.S. Appl. No. 14/859,328 dated Sep. 15, 2016, 39 pages.
Non-Final Office Action from U.S. Appl. No. 14/859,328, dated Jul. 14, 2017, 29 pages.
Non-Final Office Action from U.S. Appl. No. 15/229,233, dated Apr. 18, 2019, 87 pages.
Non-Final Office Action from U.S. Appl. No. 15/229,254, dated Feb. 14, 2018, 75 pages.
Non-Final Office Action from U.S. Appl. No. 15/229,254, dated Feb. 26, 2019, 46 pages.
Non-Final Office Action from U.S. Appl. No. 15/396,452 dated Oct. 13, 2017, 76 pages.
Non-Final Office action from U.S. Appl. No. 15/595,460, dated Jul. 27, 2017, 09 pages.
Non-Final Office Action from U.S. Appl. No. 15/595,460, dated May 3, 2018, 20 pages.
Non-Final Office Action from U.S. Appl. No. 15/881,522, dated Jun. 6, 2018, 87 pages.
Non-Final Office Action from U.S. Appl. No. 15/900,620, dated Oct. 19, 2018, 66 pages.
Non-Final Office Action from U.S. Appl. No. 15/954,188, dated Sep. 7, 2018, 41 pages.
Non-Final Office Action, U.S. Appl. No. 14/218,677, dated Oct. 30, 2019, 5 pages.
Non-Final Office Action, U.S. Appl. No. 15/229,233, dated Jan. 31, 2020, 18 pages.
Non-Final Office Action, U.S. Appl. No. 15/822,531, dated Dec. 11, 2019, 19 pages.
Non-Final Office Action, U.S. Appl. No. 15/881,522, dated Jul. 16, 2019, 39 pages.
Notice of Abandonment, U.S. Appl. No. 16/209,838, dated Sep. 4, 2019, 2 pages.
Notice of Allowance from foreign counterpart Chinese Patent Application No. 201480031042.X, dated Jul. 23, 2018, 5 pages.
Notice of Allowance from foreign counterpart Taiwan Patent Application No. 106125986, dated Jul. 6, 2018, 7 pages.
Notice of Allowance from U.S. Appl. No. 13/730,761 dated Jun. 10, 2015, 15 pages.
Notice of Allowance from U.S. Appl. No. 13/730,761 dated Sep. 28, 2015, 5 pages.
Notice of Allowance from U.S. Appl. No. 13/730,776 dated Feb. 13, 2015, 16 pages.
Notice of Allowance from U.S. Appl. No. 13/730,776 dated Mar. 24, 2015, 3 pages.
Notice of Allowance from U.S. Appl. No. 13/730,780 dated Aug. 13, 2015, 13 pages.
Notice of Allowance from U.S. Appl. No. 13/730,791 dated Mar. 10, 2015, 17 pages.
Notice of Allowance from U.S. Appl. No. 13/730,795 dated Jan. 14, 2016, 11 pages.
Notice of Allowance from U.S. Appl. No. 13/730,795 dated May 15, 2015, 8 pages.
Notice of Allowance from U.S. Appl. No. 13/730,795 dated Sep. 17, 2015, 11 pages.
Notice of Allowance from U.S. Appl. No. 14/066,273, dated Jan. 18, 2018, 26 pages.
Notice of Allowance from U.S. Appl. No. 14/066,384 dated Sep. 27, 2016, 19 pages.
Notice of Allowance from U.S. Appl. No. 14/066,384, dated Dec. 1, 2017, 23 pages.
Notice of Allowance from U.S. Appl. No. 14/066,384, dated Jul. 26, 2017, 20 pages.
Notice of Allowance from U.S. Appl. No. 14/066,384, dated May 23, 2017, 50 pages.
Notice of Allowance from U.S. Appl. No. 14/145,439 dated Jul. 6, 2015, 6 pages.
Notice of Allowance from U.S. Appl. No. 14/145,439 dated Mar. 14, 2016, 17 pages.
Notice of Allowance from U.S. Appl. No. 14/145,439 dated Oct. 28, 2015, 12 pages.
Notice of Allowance from U.S. Appl. No. 14/145,533 dated Jan. 20, 2016, 12 pages.
Notice of Allowance from U.S. Appl. No. 14/145,533 dated May 11, 2015, 5 pages.
Notice of Allowance from U.S. Appl. No. 14/145,533 dated Sep. 14, 2015, 13 pages.
Notice of Allowance from U.S. Appl. No. 14/145,607 dated Feb. 1, 2016, 28 pages.
Notice of Allowance from U.S. Appl. No. 14/145,607 dated Sep. 2, 2015, 19 pages.
Notice of Allowance from U.S. Appl. No. 14/218,504, dated May 31, 2018, 95 pages.
Notice of Allowance from U.S. Appl. No. 14/218,551, dated Aug. 16, 2017, 24 pages.
Notice of Allowance from U.S. Appl. No. 14/218,551, dated Dec. 13, 2017, 13 pages.
Notice of Allowance from U.S. Appl. No. 14/218,551, dated Feb. 8, 2017, 56 pages.
Notice of Allowance from U.S. Appl. No. 14/218,551, dated Mar. 1, 2017, 7 pages.
Notice of Allowance from U.S. Appl. No. 14/218,575, dated Apr. 10, 2019, 32 pages.
Notice of Allowance from U.S. Appl. No. 14/218,692, dated Dec. 5, 2018, 13 pages.
Notice of Allowance from U.S. Appl. No. 14/218,743, dated Aug. 1, 2018, 18 pages.
Notice of Allowance from U.S. Appl. No. 14/268,619 dated Jul. 19, 2016, 5 pages.
Notice of Allowance from U.S. Appl. No. 14/268,619 dated Oct. 3, 2016, 65 pages.
Notice of Allowance from U.S. Appl. No. 14/268,686 dated Apr. 18, 2016, 16 pages.
Notice of Allowance from U.S. Appl. No. 14/268,686 dated Jul. 8, 2016, 4 pages.
Notice of Allowance from U.S. Appl. No. 14/268,686 dated Mar. 30, 2016, 38 pages.
Notice of Allowance from U.S. Appl. No. 14/268,686 dated Nov. 5, 2015, 23 pages.
Notice of Allowance from U.S. Appl. No. 14/268,733 dated Sep. 23, 2016, 8 pages.
Notice of Allowance from U.S. Appl. No. 14/268,733, dated Jan. 20, 2017, 62 pages.
Notice of Allowance from U.S. Appl. No. 14/448,641 dated Jun. 7, 2016, 13 pages.
Notice of Allowance from U.S. Appl. No. 14/448,697 dated Jan. 14, 2016, 23 pages.
Notice of Allowance from U.S. Appl. No. 14/448,697 dated May 20, 2016, 14 pages.
Notice of Allowance from U.S. Appl. No. 14/448,697 dated Sep. 1, 2016, 3 pages.
Notice of Allowance from U.S. Appl. No. 14/448,697 dated Sep. 15, 2015, 14 pages.
Notice of Allowance from U.S. Appl. No. 14/448,747, dated Jun. 20, 2017, 14 pages.
Notice of Allowance from U.S. Appl. No. 14/448,814, dated May 9, 2018, 42 pages.
Notice of Allowance from U.S. Appl. No. 14/448,868, dated Apr. 27, 2017, 62 pages.
Notice of Allowance from U.S. Appl. No. 14/448,868, dated Jun. 26, 2017, 14 pages.
Notice of Allowance from U.S. Appl. No. 14/448,868, dated Mar. 23, 2017, 57 pages.
Notice of Allowance from U.S. Appl. No. 14/448,868, dated Nov. 17, 2017, 15 pages.
Notice of Allowance from U.S. Appl. No. 14/487,992 dated Dec. 27, 2016, 28 pages.
Notice of Allowance from U.S. Appl. No. 14/487,992 dated May 12, 2016, 11 pages.
Notice of Allowance from U.S. Appl. No. 14/487,992 dated Sep. 6, 2016, 26 pages.
Notice of Allowance from U.S. Appl. No. 14/487,992, dated Apr. 12, 2017, 14 pages.
Notice of Allowance from U.S. Appl. No. 14/487,992, dated Jul. 17, 2017, 8 pages.
Notice of Allowance from U.S. Appl. No. 14/487,992, dated Jun. 14, 2017, 14 pages.
Notice of Allowance from U.S. Appl. No. 14/859,328, dated Feb. 1, 2018, 18 pages.
Notice of Allowance from U.S. Appl. No. 15/396,452, dated Jul. 2, 2018, 23 pages.
Notice of Allowance from U.S. Appl. No. 15/396,454, dated Jan. 28, 2019, 23 pages.
Notice of Allowance from U.S. Appl. No. 15/396,454, dated Nov. 16, 2018, 34 pages.
Notice of Allowance from U.S. Appl. No. 15/396,454, dated Sep. 18, 2018, 79 pages.
Notice of Allowance from U.S. Appl. No. 15/595,460, dated Mar. 14, 2019, 32 pages.
Notice of Allowance from U.S. Appl. No. 15/595,460, dated Oct. 9, 2018, 8 pages.
Notice of Allowance from U.S. Appl. No. 15/900,620, dated Feb. 15, 2019, 20 pages.
Notice of Allowance from U.S. Appl. No. 15/954,188, dated Apr. 26, 2019, 5 pages.
Notice of Allowance, TW App. No. 102148853, dated Jul. 6, 2017, 3 pages.
Notice of Allowance, U.S. Appl. No. 14/145,466, dated Feb. 12, 2020, 12 pages.
Notice of Allowance, U.S. Appl. No. 14/218,677, dated May 8, 2020, 10 pages.
Notice of Allowance, U.S. Appl. No. 15/229,254, dated Jan. 15, 2020, 9 pages.
Notice of Allowance, U.S. Appl. No. 15/229,254, dated Mar. 17, 2020, 3 pages.
Notice of Allowance, U.S. Appl. No. 15/229,254, dated Sep. 11, 2019, 8 pages.
Notice of Allowance, U.S. Appl. No. 15/595,460, dated May 17, 2019, 10 pages.
Notice of Allowance, U.S. Appl. No. 15/881,522, dated Apr. 20, 2020, 10 pages.
Notice of Allowance, U.S. Appl. No. 15/881,522, dated Dec. 31, 2019, 10 pages.
Notice of Reasons for Refusal, JP App. No. 2018-153218, dated Jun. 5, 2019, 7 pages.
Notice of Reasons for Refusal, JP App. No. 2018-209608, dated Oct. 7, 2019, 11 pages (7 pages of English Translation and 4 pages of Original Document).
Notice of Reasons for Rejection from foreign counterpart Japanese Patent Application No. 2017-505513, dated Oct. 22, 2018, 6 pages.
Notice of Reasons for Rejection, JP App. No. 2016-566924, dated Mar. 7, 2019, 23 pages.
Notification Concerning Transmittal of International Preliminary Report on Patentability for Application No. PCT/US14/39627, dated Dec. 10, 2015, 8 pages.
Notification for Granting Patent Right and Search Report from foreign counterpart Chinese Patent Application No. 201380068869.3, dated May 4, 2018, 10 pages.
Notification of Reason for Rejection from foreign counterpart Japanese Patent Application No. 2016-505506, dated Feb. 13, 2018, 6 pages.
Notification of Reasons for Refusal, JP App. No. 2017-505072, dated Apr. 15, 2019, 8 paegs.
Notification of Reasons for Refusal, JP App. No. 2017-514840, dated Apr. 1, 2019, 10 pages.
Notification of Reasons for Rejection from foreign counterpart Japanese Patent Application No. 2016-0516743, dated Apr. 23, 2018, 12 pages.
Notification of Reasons for Rejection, JP App. No. 2016-566912, dated Jan. 31, 2019, 11 pages.
Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US13/77888, dated Aug. 4, 2014, 10 pages.
Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US14/31344, dated Nov. 3, 2014, 16 pages.
Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US14/39627, dated Oct. 16, 2014, 10 pages.
Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US15/50348, dated Dec. 22, 2015, 9 pages.
Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US2015/042786, dated Oct. 16, 2015, 8 pages.
Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US2015/042799, dated Oct. 16, 2015, 8 pages.
Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US2015/042870, dated Oct. 30, 2015, 9 pages.
Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US2015/42783, dated Oct. 19, 2015, 13 pages.
Notification of Transmittal of the International Search Report and the Written Opinion from counterpart Patent Cooperation Treaty Application No. PCT/US2015/42827, dated Oct. 30, 2015, 9 pages.
Notification of Transmittal or International Search Report and Written Opinion from PCT/US2015/028927, dated Jul. 30, 2015, 12 pages.
OASIS Standard, "Authentication Context for the OASIS Security Assertion Markup Language (SAML) V2.0," Mar. 15, 2005, 70 pages.
Office Action and Search Report from foreign counterpart Chinese Patent Application No. 201480031042.X, dated Dec. 4, 2017, 20 pages.
Office Action and Search Report from foreign counterpart Taiwan Patent Application No. 106125986, dated Mar. 19, 2018, 6 pages.
Office Action and Search Report, TW App. No. 107127837, dated Jun. 26, 2019, 4 pages.
Office Action from foreign counterpart Japanese Patent Application No. 2015-550778, dated Feb. 7, 2018, 14 pages.
Office Action from foreign counterpart Japanese Patent Application No. 2017-505504, dated Apr. 15, 2019, 3 pages.
Office Action from foreign counterpart Taiwan Patent Application No. 102148853, dated Feb. 17, 2017, 9 pages.
Pan G., et al., "Liveness Detection for Face Recognition" in: Recent Advances in Face Recognition, 2008, pp. 109-124, Vienna : I-Tech, 2008, Ch. 9, ISBN: 978-953-7619-34-3.
Pan G., et al., "Monocular Camera-based Face Liveness Detection by Combining Eyeblink and Scene Context," pp. 215-225, s.l. : Springer Science+Business Media, LLC, Aug. 4, 2010. Retrieved from the Internet: URL: http://www.cs.zju.edu.cn/-gpan/publication/2011-TeleSysliveness.pdf.
Partial Supplementary European Search Report from European Patent Application No. 14770682.4, dated Oct. 14, 2016, 8 pages.
Peng Y., et al., "RASL: Robust Alignment by Sparse and Low-Rank Decomposition for Linearly Correlated Images", IEEE Conference on Computer Vision and Pattern Recognition, 2010, pp. 763-770. Retrieved from the Internet: URL: http://yima.csl.illinois.edu/psfile/RASL CVPR10.pdf.
Phillips P. J., et al., "Biometric Image Processing and Recognition," Chellappa, 1998, Eusipco, 8 pages.
Phillips P.J., et al., "Face Recognition Vendor Test 2002: Evaluation Report," s.l. : NISTIR 6965, 2002, 56 pages. Retrieved from the Internet: URL: http://www.facerec.org/vendors/FRVT2002_Evaluation_Report.pdf.
Phillips P.J., et al., "FRVT 2006 and ICE 2006 Large-Scale Results", NIST IR 7408, Gaithersburg, NIST, 2006, Mar. 29, 2007, pp. 1-55.
Pinto A., et al., "Video-Based Face Spoofing Detection through Visual Rhythm Analysis," Los Alamitos : IEEE Computer Society Conference Publishing Services, 2012, Conference on Graphics, Patterns and Images, 8 pages.(SIBGRAPI). Retrieved from the Internet: URL: http://sibgrapi.sid.inpe.br/rep/sid.inpe.br/sibgrapi/2012/07.13.21.16?mirror=sid.inpe.br/ banon/2001/03.30.15.38.24&metadatarepository=sid.inpe.br/sibgrapi/2012/07.13.21.1 6.53.
Quinn G.W., et al., "Performance of Face Recognition Algorithms on Compressed Images", NIST Inter Agency Report 7830, NIST, Dec. 4, 2011, 35 pages.
Ratha N.K., et al., "An Analysis of Minutiae Matching Strength," Audio-and Video-Based Biometric Person Authentication, Springer Berlin Heidelberg, 2001, 7 pages.
Ratha N.K., et al., "Enhancing Security and Privacy in Biometrics-Based Authentication Systems," IBM Systems Journal, 2001, vol. 40 (3), pp. 614-634.
Rejection Judgment, JP App. No. 2017-505513, dated Jun. 17, 2019, 4 pages.
Requirement for Restriction/Election from U.S. Appl. No. 14/218,504 dated Aug. 16, 2016, 11 pages.
Requirement for Restriction/Election, U.S. Appl. No. 15/822,531, dated Oct. 16, 2019, 6 pages.
RF 6749: Hardt D, "The OAuth 2.0 Authorization Framework," Internet Engineering Task Force(IETF), Request for Comments: 6749, retrieved from https://tools.ietf.org/pdf/rfc6749.pdf, Oct. 2012, pp. 1-76.
Roberts C., "Biometric Attack Vectors and Defences," Sep. 2006, 25 pages. Retrieved from the Internet: URL: http://otago.ourarchive.ac.nz/bitstream/handle/10523/1243/BiometricAttackVectors.pdf.
Rocha A., et al., "Vision of the Unseen: Current Trends and Challenges in Digital Image and Video Forensics," ACM Computing Surveys, 2010, 47 pages. Retrieved from the Internet: URL: http://www.wjscheirer.com/papers/wjscsur2011forensics.pdf.
Rodrigues R.N., et al., "Robustness of Multimodal Biometric Fusion Methods Against Spoof Attacks," Journal of Visual Language and Computing. 2009. 11 pages, doi:10.1016/j.jvlc.2009.01.010; Retrieved from the Internet: URL: http://cubs.buffalo.edu/govind/papers/visual09.pdf.
Ross A., et al., "Multimodal Biometrics: An Overview," Proceedings of 12th European Signal Processing Conference (EUSIPCO), Sep. 2004, pp. 1221-1224. Retrieved from the Internet: URL: http://www.csee.wvu.edu/-ross/pubs/RossMultimodaiOverview EUSIPC004.pdf.
Saito T., "Mastering TCP/IP, Information Security," Ohmsha Ltd., dated Sep. 1, 2013, pp. 77-80 (7 pages).
Schmidt et al., "Trusted Platform Validation and Management," International Journal of Dependable and Trustworth Information Systems, vol. 1, No. 2, Apr.-Jun. 2010, pp. 1-31.
Schneier B., Biometrics: Uses and Abuses. Aug. 1999. Inside Risks 110 (CACM 42, Aug. 8, 1999), Retrieved from the Internet: URL: http://www.schneier.com/essay-019.pdf, 3 pages.
Schuckers, "Spoofing and Anti-Spoofing Measures," Information Security Technical Report, 2002, vol. 2002, pp. 56-62.
Schwartz et al., "Face Spoofing Detection Through Partial Least Squares and Low-Level Descriptors," International Conference on Biometrics, 2011, vol. 2011, pp. 1-8.
Second Office Action, CN App. No. 201580040813.6, dated Mar. 24, 2020, 19 pages (11 pages of English Translation and 8 pages of Original Document).
Smiatacz M., et al., Gdansk University of Technology. Liveness Measurements Using Optical Flow for Biometric Person Authentication. Metrology and Measurement Systems. 2012, vol. XIX, 2. pp. 257-268.
Starnberger G., et al., "QR-TAN: Secure Mobile Transaction Authentication," Availability, Reliability and Security, 2009, ARES'09, International Conference on IEEE, Mar. 16, 2009, pp. 578-585.
Supplementary Partial European Search Report for Application No. 13867269 dated Aug. 3, 2016, 7 pages.
T. Weigold et al., "The Zurich Trusted Information Channel—An Efficient Defence against Man-in-the-Middle and Malicious Software Attacks," P. Lipp, A.R. Sadeghi, and K.M. Koch, eds., Proc. Trust Conf. (Trust 2008), LNCS 4968, Springer-Verlag, 2008, pp. 75-91.
Tan et al., "Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model," European Conference on Computer Vision, 2010, vol. 2010, pp. 1-14.
TechTarget, What is network perimeter? Definition from Whatls.com downloaded from http://searchnetworking.techtarget.com/definition/network-perimeter on Apr. 14, 2017, 5 pages.
The Extended M2VTS Database, [retrieved on Sep. 29, 2012], Retrieved from the Internet: URL: http://www.ee.surrey.ac.uk/CVSSP/xm2vtsdb/, 1 page.
The Online Certificate Status Protocol, OCSP, RFC2560, 22 pages.
The source for Linux information, Linux.com, [online], [retrieved on Jan. 28, 2015], 2012, 3 pages.
Transmittal of International Preliminary Report on Patentability for Patent Application No. PCT/US2013/077888 dated Jul. 9, 2015, 7 pages.
Transmittal of International Preliminary Report on Patentability from foreign counterpart PCT Patent Application No. PCT/US2014/031344 dated Oct. 1, 2015, 9 pages.
Tresadern P., et al., "Mobile Biometrics (MoBio): Joint Face and Voice Verification for a Mobile Platform", 2012, 7 pages. Retrieved from the Internet: URL: http://personal.ee.surrey.ac.uk/Personai/Norman.Poh/data/tresadern_PervComp2012draft.pdf.
Tronci R., et al., "Fusion of Multiple Clues for Photo-Attack Detection in Face Recognition Systems," International Joint Conference on Biometrics, 2011. pp. 1-6.
Uludag, Umut, and Anil K. Jain. "Attacks on biometric systems: a case study in fingerprints." Electronic Imaging 2004. International Society for Optics and Photonics, 2004, 12 pages.
Unobtrusive User-Authentication on Mobile Phones using Biometric Gait Recognition, 2010, 6 pages.
Uymatiao M.L.T., et al., "Time-based OTP authentication via secure tunnel (TOAST); A mobile TOTP scheme using TLS seed exchage and encrypted offline keystore," 2014 4th IEEE International Conference on Information Science and Technology, IEEE, Apr. 26, 2014, pp. 225-229.
Validity, OSTP Framework, 24 pages, 2010.
Vassilev, A.T.; du Castel, B.; Ali, A.M., "Personal Brokerage of Web Service Access," Security & Privacy, IEEE, vol. 5, No. 5, pp. 24-31, Sep.-Oct. 2007.
Watanabe H., et al., "The Virtual Wearable Computing System Assumed Widely Movement," the multimedia, distribution and cooperation which were taken into consideration, mobile (DICOMO2009) symposium collected-papers [CD-ROM], Japan, Information Processing Society of Japan, Jul. 1, 2009, and vol. 2009 (1), pp. 1406-1414. (Abstract only in English).
WikiPedia article for Eye Tracking, 15 pages, Last Modified Jun. 21, 2014, en.wikipedia.org/wiki/Eye_tracking.
Willis N., Linux.com. Weekend Project: Take a Tour of Open Source Eye-Tracking Software. [Online] Mar. 2, 2012. [Cited: Nov. 1, 2012.], 4 pages. Retrieved from the Internet: URL: https://www.linux.com/learn/tutorials/550880-weekend-project-take-a-tour-of-opensource-eye-tracking-software.
Wilson R., "How to Trick Google's New Face Unlock on Android 4.1 Jelly Bean," Aug. 6, 2012, 5 pages, [online], [retrieved Aug. 13, 2015].
World Wide Web Consortium, W3C Working Draft: Media Capture and Streams, 2013, 36 pages.
Zhang, "Security Verification of Hardware-enabled Attestation Protocols," IEEE, 2012, pp. 47-54.
Zhao W., et al., "Face Recognition: A Literature Survey," ACM Computing Surveys, 2003, vol. 35 (4), pp. 399-458.
Zhou et al., "Face Recognition from Still Images and Videos". University of Maryland, College Park, MD 20742. Maryland : s.n., Nov. 5, 2004.pp. 1-23, Retrieved from the Internet: http://citeseerx.ist.psu.edu/viewdoc/download?doi=1 0.1.1.77.1312&rep=rep1 &type=pdf.

Cited By (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20210342425A1 (en)*2017-06-042021-11-04Harsha RamalingamSelf-owned authentication and identity framework
US11704393B2 (en)*2017-06-042023-07-18Harsha RamalingamSelf-owned authentication and identity framework
US11301551B2 (en)*2017-07-062022-04-12Ebay Inc.Computing asset access control
US11100204B2 (en)*2018-07-192021-08-24Motorola Mobility LlcMethods and devices for granting increasing operational access with increasing authentication factors
US11263116B2 (en)2019-01-242022-03-01International Business Machines CorporationChampion test case generation
US11106567B2 (en)2019-01-242021-08-31International Business Machines CorporationCombinatoric set completion through unique test case generation
US11099975B2 (en)2019-01-242021-08-24International Business Machines CorporationTest space analysis across multiple combinatoric models
US11232020B2 (en)2019-06-132022-01-25International Business Machines CorporationFault detection using breakpoint value-based fingerprints of failing regression test cases
US10970197B2 (en)*2019-06-132021-04-06International Business Machines CorporationBreakpoint value-based version control
US11422924B2 (en)2019-06-132022-08-23International Business Machines CorporationCustomizable test set selection using code flow trees
US20220261496A1 (en)*2020-05-132022-08-18Capital One Services, LlcSecuring Confidential Information During a Telecommunication Session
US11914751B2 (en)*2020-05-132024-02-27Capital One Services, LlcSecuring confidential information during a telecommunication session
US20240152644A1 (en)*2020-05-132024-05-09Capital One Services, LlcSecuring Confidential Information During a Telecommunication Session
US12437107B2 (en)*2020-05-132025-10-07Capital One Services, LlcSecuring confidential information during a telecommunication session

Also Published As

Publication numberPublication date
US9367676B2 (en)2016-06-14
US9396320B2 (en)2016-07-19
US20140289117A1 (en)2014-09-25
US10366218B2 (en)2019-07-30
US20140289116A1 (en)2014-09-25
US20140289819A1 (en)2014-09-25
US20140289834A1 (en)2014-09-25
US10176310B2 (en)2019-01-08
US10706132B2 (en)2020-07-07
US9305298B2 (en)2016-04-05
US20140289821A1 (en)2014-09-25
US20140289808A1 (en)2014-09-25
US20140289822A1 (en)2014-09-25
US20140289528A1 (en)2014-09-25
US20180247038A1 (en)2018-08-30
US10762181B2 (en)2020-09-01
US20140289790A1 (en)2014-09-25
US9898596B2 (en)2018-02-20
US10268811B2 (en)2019-04-23
US20140289820A1 (en)2014-09-25
US20140289509A1 (en)2014-09-25
US10282533B2 (en)2019-05-07

Similar Documents

PublicationPublication DateTitle
US10776464B2 (en)System and method for adaptive application of authentication policies
US11929997B2 (en)Advanced authentication techniques and applications
JP7603121B2 (en) Secure Key Storage Extensions for Transaction Verification and Cryptocurrencies
US11831409B2 (en)System and method for binding verifiable claims
US12126613B2 (en)System and method for pre-registration of FIDO authenticators
US10637853B2 (en)Authentication techniques including speech and/or lip movement analysis
US10769635B2 (en)Authentication techniques including speech and/or lip movement analysis
US20250124438A1 (en)System and method for speculative attestation and associated techniques
HK40033287A (en)Advanced authentication techniques and applications

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:NOK NOK LABS, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WILSON, BRENDON;REEL/FRAME:034913/0103

Effective date:20141217

ASAssignment

Owner name:VENTURE LENDING & LEASING VII, INC., CALIFORNIA

Free format text:SECURITY INTEREST;ASSIGNOR:NOK NOK LABS, INC.;REEL/FRAME:041352/0867

Effective date:20170111

Owner name:VENTURE LENDING & LEASING VIII, INC., CALIFORNIA

Free format text:SECURITY INTEREST;ASSIGNOR:NOK NOK LABS, INC.;REEL/FRAME:041352/0867

Effective date:20170111

ASAssignment

Owner name:VENTURE LENDING & LEASING IX, INC., CALIFORNIA

Free format text:SECURITY INTEREST;ASSIGNOR:NOK NOK LABS, INC.;REEL/FRAME:046492/0870

Effective date:20180705

Owner name:VENTURE LENDING & LEASING VIII, INC., CALIFORNIA

Free format text:SECURITY INTEREST;ASSIGNOR:NOK NOK LABS, INC.;REEL/FRAME:046492/0870

Effective date:20180705

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPPInformation on status: patent application and granting procedure in general

Free format text:AWAITING TC RESP, ISSUE FEE PAYMENT VERIFIED

STPPInformation on status: patent application and granting procedure in general

Free format text:PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment:4

ASAssignment

Owner name:NOK NOK LABS, INC., CALIFORNIA

Free format text:RELEASE BY SECURED PARTY;ASSIGNORS:VENTURE LENDING & LEASING VII, INC.;VENTURE LENDING & LEASING VIII, INC.;REEL/FRAME:071257/0566

Effective date:20250527

ASAssignment

Owner name:NOK NOK LABS, INC., CALIFORNIA

Free format text:RELEASE BY SECURED PARTY;ASSIGNORS:VENTURE LENDING & LEASING VIII, INC.;VENTURE LENDING & LEASING IX, INC.;REEL/FRAME:071273/0025

Effective date:20250527

ASAssignment

Owner name:NOK NOK LABS, INC., CALIFORNIA

Free format text:CORRECTIVE ASSIGNMENT TO CORRECT THE ERRONEOUSLY RECORDED PATENT APPLICATION NUMBER 14488747 PREVIOUSLY RECORDED ON REEL 71273 FRAME 25. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNORS:VENTURE LENDING & LEASING IX, INC.;VENTURE LENDING & LEASING VIII, INC.;REEL/FRAME:071773/0352

Effective date:20250527

ASAssignment

Owner name:MUFG BANK, LTD., NEW YORK

Free format text:SECURITY INTEREST;ASSIGNOR:NOK NOK LABS, INC.;REEL/FRAME:071773/0493

Effective date:20250623


[8]ページ先頭

©2009-2025 Movatter.jp